[HTML][HTML] Private set intersection: A systematic literature review
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …
parties to compute a function on their private inputs, obtaining the output at the end and …
Secure multi-party computation: theory, practice and applications
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
Fast private set intersection from homomorphic encryption
Private Set Intersection (PSI) is a cryptographic technique that allows two parties to compute
the intersection of their sets without revealing anything except the intersection. We use fully …
the intersection of their sets without revealing anything except the intersection. We use fully …
PSI from PaXoS: fast, malicious private set intersection
We present a 2-party private set intersection (PSI) protocol which provides security against
malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol of …
malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol of …
Scalable private set intersection based on OT extension
Private set intersection (PSI) allows two parties to compute the intersection of their sets
without revealing any information about items that are not in the intersection. It is one of the …
without revealing any information about items that are not in the intersection. It is one of the …
Efficient circuit-based PSI with linear communication
We present a new protocol for computing a circuit which implements the private set
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …
intersection functionality (PSI). Using circuits for this task is advantageous over the usage of …
Oblivious key-value stores and amplification for private set intersection
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
consider the more general notion of an oblivious key-value store (OKVS), which is a data …
Private set intersection in the internet setting from lightweight oblivious PRF
We present a new protocol for two-party private set intersection (PSI) with semi-honest
security in the plain model and one-sided malicious security in the random oracle model …
security in the plain model and one-sided malicious security in the random oracle model …
Practical multi-party private set intersection from symmetric-key techniques
We present a new paradigm for multi-party private set intersection (PSI) that allows n parties
to compute the intersection of their datasets without revealing any additional information. We …
to compute the intersection of their datasets without revealing any additional information. We …
Efficient circuit-based PSI via cuckoo hashing
While there has been a lot of progress in designing efficient custom protocols for computing
Private Set Intersection (PSI), there has been less research on using generic Multi-Party …
Private Set Intersection (PSI), there has been less research on using generic Multi-Party …