搜索结果: 1-15 共查到“军事学 SET”相关记录77条 . 查询时间(0.203 秒)
Private Set Relations with Bloom Filters for Outsourced SLA Validation
Bloom filters set operations set relations
2019/9/5
In the area of cloud computing, judging the fulfillment of service-level agreements on a technical level is gaining more and more importance. To support this we introduce privacy preserving set relati...
Scalable Private Set Union from Symmetric-Key Techniques
Private Set Union Private Membership Test
2019/7/4
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
accumulators bitcoin merkle proofs
2019/6/4
In the Bitcoin consensus network, all nodes come to agreement on the set of Unspent Transaction Outputs (The “UTXO” set). The size of this shared state is a scalability constraint for the network, as ...
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
private set intersection OT extension
2019/6/4
We describe a novel approach for two-party private set intersection (PSI) with semi-honest security. Compared to existing PSI protocols, ours has a more favorable balance between communication and com...
Cheaper Private Set Intersection via Differentially Private Leakage
private set intersection differential privacy
2019/3/4
In this work we demonstrate that allowing differentially private leakage can significantly improve the concrete performance of secure 2-party computation (2PC) protocols. Specifically, we focus on the...
The Communication Complexity of Threshold Private Set Intersection
Communication Complexity Private Set Intersection
2019/3/1
Threshold private set intersection enables Alice and Bob who hold sets AA and BB of size nn to compute the intersection A∩BA∩B if the sets do not differ by more than some threshold parameter tt. In th...
Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity
Private Set Union Cardinality Private Set Intersection Cardinality Privacy Preserving Data Mining
2018/5/28
The computation of private set union/intersection cardinality (PSU-CA/PSI-CA) is one of the most intensively studied problems in Privacy Preserving Data Mining (PPDM). However, existing protocols are ...
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Private Set Intersection Secure Computation Cloud Computing
2018/5/28
Private set intersection (PSI) is an essential cryptographic protocol that has many real world applications. As cloud computing power and popularity have been swiftly growing, it is now desirable to l...
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
private set intersection reactive functionalities
2018/4/17
Private Set Intersection (PSI) is a popular cryptographic primitive that allows two parties, a client and a server, to compute the intersection of their private sets, so that the client only receives ...
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations
P2KMV analytical expectations
2018/3/9
In this paper, we propose P2KMV, a novel privacy-preserving counting sketch, based on the k minimum values algorithm. With P2KMV, we offer a versatile privacy-enhanced technology for obtaining statist...
Private Set Intersection with Linear Communication from General Assumptions
PSI cryptographic protocols
2018/3/9
This work presents an improved hashing-based algorithm for Private Set Intersection (PSI) in the honest-but-curious setting. The protocol is generic, modular and provides both asymptotic and concrete ...
Combining Private Set-Intersection with Secure Two-Party Computation
PSI PSM set-intersection
2018/1/31
Private Set-Intersection (PSI) is one of the most popular and practically relevant secure two-party computation (2PC) tasks. Therefore, designing special-purpose PSI protocols (which are more efficien...
Analysis of the Bitcoin UTXO set
Bitcoin UTXO set analysis
2017/11/13
Bitcoin relies on the Unspent Transaction Outputs (UTXO) set to efficiently verify new generated transactions. Every unspent out- put, no matter its type, age, value or length is stored in every full ...
An Algebraic Approach to Maliciously Secure Private Set Intersection
Private set intersection oblivious linear function evaluation multi-party
2017/11/10
Private set intersection is an important area of research and has been the focus of many works over the past decades. It describes the problem of finding an intersection between the input sets of at l...
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
Private Set Intersection Oblivious PRF Secure Multiparty Computation
2017/8/28
We present a new paradigm for multi-party private set intersection (PSI) that allows nn parties to compute the intersection of their datasets without revealing any additional information. We explore a...