Login / Signup
Malicious-Secure Private Set Intersection via Dual Execution.
Peter Rindal
Mike Rosulek
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
set intersection
semi honest
constraint networks
global consistency
user privacy
homomorphic encryption
machine learning
privacy preserving
dot product