Login / Signup
Combining Private Set-Intersection with Secure Two-Party Computation.
Michele Ciampi
Claudio Orlandi
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
set intersection
semi honest
secure multi party computation
constraint networks
dot product
global consistency
privacy preserving
record linkage
key agreement protocol
search space
key management
homomorphic encryption