Login / Signup
Practical and malicious private set intersection with improved efficiency.
Yizhao Zhu
Lanxiang Chen
Yi Mu
Published in:
Theor. Comput. Sci. (2024)
Keyphrases
</>
set intersection
privacy preserving
constraint networks
real world
support vector
special case