Login / Signup

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.

Emiliano De CristofaroJihye KimGene Tsudik
Published in: ASIACRYPT (2010)
Keyphrases
  • machine learning
  • probabilistic model
  • linear complexity
  • similarity measure
  • objective function
  • special case
  • access control
  • security analysis