2017
DOI: 10.1007/978-3-319-53177-9_14
|View full text |Cite
|
Sign up to set email alerts
|

New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…The scheme is secure under the Decisional Diffie-Hellman (DDH) assumption in the ROM against semi-honest adversaries and achieves linear communication and Θ(v log v) as computational complexity. Recently, Debnath and Dutta [21] designed a fair optimistic two-way PSI over prime order group. The scheme is optimistic in the sense that it uses an off-line semi-trusted third party.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme is secure under the Decisional Diffie-Hellman (DDH) assumption in the ROM against semi-honest adversaries and achieves linear communication and Θ(v log v) as computational complexity. Recently, Debnath and Dutta [21] designed a fair optimistic two-way PSI over prime order group. The scheme is optimistic in the sense that it uses an off-line semi-trusted third party.…”
Section: Related Workmentioning
confidence: 99%
“…And in the standard model, it has been proven to resist the attack of malicious adversaries. In [12], an mPSI protocol with linear communication and computational overhead is constructed by using prime order group. e protocol uses a distributed ElGamal encryption algorithm and an offline semitrusted third party to achieve the fairness of the protocol and the security under the malicious adversary model.…”
Section: Mutual Psimentioning
confidence: 99%
“…Performance Evaluation 6.1. eoretical Evaluation. In this section, regarding the complexity of calculation and communication, we compare the O-mPSI protocol with the protocols in [11,12,20]. We choose these three protocols because both parties of the protocols in [11,12] can know the intersection, and the protocol in [20] supports outsourcing.…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations