[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

Simple, fast malicious multiparty private set intersection

O Nevo, N Trieu, A Yanai - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
We address the problem of multiparty private set intersection against a malicious adversary.
First, we show that when one can assume no collusion amongst corrupted parties then there …

Blazing fast PSI from improved OKVS and subfield VOLE

S Raghuraman, P Rindal - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
We present new semi-honest and malicious secure PSI protocols that outperform all prior
works by several times in both communication and running time. Our semi-honest protocol …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …

Compact and malicious private set intersection for small sets

M Rosulek, N Trieu - Proceedings of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
We describe a protocol for two-party private set intersection (PSI) based on Diffie-Hellman
key agreement. The protocol is proven secure against malicious parties, in the ideal …

{Near-Optimal} Oblivious {Key-Value} Stores for Efficient {PSI},{PSU} and {Volume-Hiding}{Multi-Maps}

A Bienstock, S Patel, JY Seo, K Yeo - 32nd USENIX Security Symposium …, 2023 - usenix.org
In this paper, we study oblivious key-value stores (OKVS) that enable encoding n key-value
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …

Structure-aware private set intersection, with applications to fuzzy matching

G Garimella, M Rosulek, J Singh - Annual International Cryptology …, 2022 - Springer
In two-party private set intersection (PSI), Alice holds a set X, Bob holds a set Y, and they
learn (only) the contents of X∩ Y. We introduce structure-aware PSI protocols, which take …

Malicious secure, structure-aware private set intersection

G Garimella, M Rosulek, J Singh - Annual International Cryptology …, 2023 - Springer
Abstract Structure-Aware private set intersection (sa-PSI) is a variant of PSI where Alice's
input set A has some publicly known structure, Bob's input B is an unstructured set of points …

Psimple: Practical multiparty maliciously-secure private set intersection

A Ben-Efraim, O Nissenbaum, E Omri… - Proceedings of the …, 2022 - dl.acm.org
Private set intersection (PSI) protocols allow a set of mutually distrustful parties, each
holding a private set of items, to compute the intersection over all their sets, such that no …

Half-tree: Halving the cost of tree expansion in cot and dpf

X Guo, K Yang, X Wang, W Zhang, X **e… - … Conference on the …, 2023 - Springer
GGM tree is widely used in the design of correlated oblivious transfer (COT), subfield vector
oblivious linear evaluation (sVOLE), distributed point function (DPF), and distributed …