Login / Signup
Malicious-Secure Private Set Intersection via Dual Execution.
Peter Rindal
Mike Rosulek
Published in:
CCS (2017)
Keyphrases
</>
set intersection
semi honest
constraint networks
privacy preserving
global consistency
dot product
homomorphic encryption
knn
encryption scheme
scalar product