Back to Results
First PageMeta Content
Cryptographic protocols / Computational complexity theory / IP / Homomorphic encryption / Paillier cryptosystem / Communication complexity / One-way function / Polynomial / Oblivious transfer / Cryptography / Theoretical computer science / Applied mathematics


Efficient Private Matching and Set Intersection Michael J. Freedman1? , Kobbi Nissim2?? , and Benny Pinkas3 1 2
Add to Reading List

Document Date: 2004-05-12 12:29:04


Open Document

File Size: 204,35 KB

Share Result on Facebook

Company

NEC Labs / HP Labs / Microsoft / /

/

Event

Person Communication and Meetings / /

Facility

New York University / /

IndustryTerm

oblivious transfer protocols / secure protocols / server protocol / bit transfer protocol / secure circuit evaluation protocol / server computing polynomials / approximation protocol / data mining / client protocol / threshold protocol / online recommendation services / private matching protocol / private approximation protocol / arbitrary private-matching protocols / sublinear private approximation protocol / circuit computing / private approximation protocols / set-intersection protocols / bit-transfer protocol / computing / online collaboration / suitable secure protocol / fine-tunes exponentiation algorithms / /

Organization

New York University / /

Position

respective PM / Prime Minister / basic PM / author was / random oracle model / secure against ? ? / author / random oracle model / against semi-honest parties / Private / /

Product

Horner / /

ProgrammingLanguage

L / /

Technology

threshold protocol / 1-out-of-N bit transfer protocol / secure circuit evaluation protocol / two-party protocol / server protocol / real protocol / semantically-secure encryptions / The protocol / private approximation protocols / private key / two protocols / arbitrary private-matching protocols / 1-out-of-2 bit-transfer protocol / PET protocol / random encryption / basic PM protocol / fine-tunes exponentiation algorithms / resulting protocol / encryption / These protocols / OT protocol / set-intersection protocols / random.7 See Protocol / PM protocol / private matching protocol / approximation protocol / encryption system / data mining / sampling-based private approximation protocol / hashing-based protocol / sublinear private approximation protocol / The client protocol / suitable secure protocol / oblivious transfer protocols / /

SocialTag