Login / Signup
Combining Private Set-Intersection with Secure Two-Party Computation.
Michele Ciampi
Claudio Orlandi
Published in:
SCN (2018)
Keyphrases
</>
set intersection
semi honest
secure multi party computation
scalar product
dot product
constraint networks
privacy preserving
global consistency
key agreement protocol
qualitative and quantitative
record linkage
security model
cryptographic protocols
gaussian kernels
homomorphic encryption