A two-party privacy preserving set intersection protocol against malicious users in cloud computing.
Xuefei CaoHui LiLanjun DangYin LinPublished in: Comput. Stand. Interfaces (2017)
Keyphrases
- cloud computing
- set intersection
- semi honest
- privacy preserving
- user privacy
- identity management
- vertically partitioned data
- data privacy
- sensitive data
- privacy preservation
- data management
- homomorphic encryption
- service providers
- privacy preserving data mining
- scalar product
- multi party
- constraint networks
- sensitive information
- private information
- dot product
- third party