Login / Signup

Practical and malicious private set intersection with improved efficiency.

Yizhao ZhuLanxiang ChenYi Mu
Published in: Theor. Comput. Sci. (2024)
Keyphrases
  • set intersection
  • privacy preserving
  • constraint networks
  • real world
  • support vector
  • special case