Login / Signup

Secure Set Intersection with Untrusted Hardware Tokens.

Marc FischlinBenny PinkasAhmad-Reza SadeghiThomas SchneiderIvan Visconti
Published in: CT-RSA (2011)
Keyphrases
  • set intersection
  • sensitive data
  • low cost
  • third party
  • constraint networks
  • real time
  • global consistency
  • hardware implementation
  • privacy preserving
  • computer systems
  • trusted computing
  • data privacy