2021
DOI: 10.1109/tpds.2021.3074440
|View full text |Cite
|
Sign up to set email alerts
|

MCFsyn: A Multi-Party Set Reconciliation Protocol With the Marked Cuckoo Filter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…where l is the length of the fingerprint. Typical CF variants include Adaptive CF [33], Consistent CF [34], Dynamic CF [35], Simplified CF [36], Vertical CF [37], Marked CF [11] and Vacuum filter [38]. They are investigated to enhance CF in terms of false positive rate, flexibility, key set extension, theoretical guarantee, space efficiency, set reconciliation and query throughput.…”
Section: B Cuckoo Filter and Its Variantsmentioning
confidence: 99%
See 3 more Smart Citations
“…where l is the length of the fingerprint. Typical CF variants include Adaptive CF [33], Consistent CF [34], Dynamic CF [35], Simplified CF [36], Vertical CF [37], Marked CF [11] and Vacuum filter [38]. They are investigated to enhance CF in terms of false positive rate, flexibility, key set extension, theoretical guarantee, space efficiency, set reconciliation and query throughput.…”
Section: B Cuckoo Filter and Its Variantsmentioning
confidence: 99%
“…Marked Cuckoo filter. Marked Cuckoo filter [11] is designed to represent the sets in each reconciliation participant. The MCF attaches a mark field in each slot to indicate which set(s) the stored fingerprint belongs to.…”
Section: B Cuckoo Filter and Its Variantsmentioning
confidence: 99%
See 2 more Smart Citations
“…In data storage, for example, P2P networks store object content on each node through the sketch [12] . In data sharing, set synchronization can realize file information sharing between different hosts through the sketch [13] . In data security, the sketch naturally realizes data encryption operations by only representing the summary information of data through hash calculation, which ensures data privacy and security.…”
mentioning
confidence: 99%