Login / Signup

Malicious-Secure Private Set Intersection via Dual Execution.

Peter RindalMike Rosulek
Published in: CCS (2017)
Keyphrases
  • set intersection
  • semi honest
  • constraint networks
  • privacy preserving
  • global consistency
  • dot product
  • homomorphic encryption
  • knn
  • encryption scheme
  • scalar product