Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] Efficient Private Matching and Set Intersection - Benny PinkasWe consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of ele- ments taken from a large ...
-
[2]
[PDF] Private set intersection: A systematic literature review - NICS LabWe review Private Set Intersection, a very wide problem that can be solved with many different techniques. • We identify Homomorphic Encryption, ...
-
[3]
Fast Private Set Intersection from Homomorphic Encryption - MicrosoftOct 30, 2017 · Private Set Intersection (PSI) is a cryptographic technique that allows two parties to compute the intersection of their sets without ...Missing: definition | Show results with:definition
-
[4]
A Brief Overview of Private Set IntersectionApr 19, 2021 · Private set intersection (PSI) is a special case of multiparty computation, in which each party has a set of items and the goal is to learn the ...Missing: definition | Show results with:definition
-
[5]
[PDF] Private Set Intersection - Computer ScienceDec 7, 2021 · Abstract. A private set intersection (PSI) protocol allows two (or more) parties, each with sets from a common domain, to learn the ...
-
[6]
Private set intersection: A systematic literature review - ScienceDirectThe classical definition of PSI allows two parties to compute the intersection on their sets. ... GCD-filter: Private set intersection without encryption. Wang L.
- [7]
-
[8]
[PDF] Policy-Enhanced Private Set Intersection: Sharing Information While ...However, due to privacy regula- tions such as the Health Insurance Portability and Ac- countability Act (HIPAA), they can only share a pa- tient's record if ...
-
[9]
Mobile Private Contact Discovery at Scale - USENIXMobile Private Contact Discovery at Scale ... The most promising approaches addressing this problem revolve around private set intersection (PSI) protocols.
- [10]
-
[11]
LiPISC: A Lightweight and Flexible Method for Privacy-Aware ...The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate ...
-
[12]
Structure-Aware Private Set Intersection, with Applications to Fuzzy ...Aug 7, 2025 · A major impediment to using recommendation systems and collective knowledge for electronic commerce is the reluctance of individuals to ...
-
[13]
Advancing Compliance with HIPAA and GDPR in HealthcareOct 15, 2025 · Design of secure and privacy-preserving data sharing scheme based on key aggregation and private set intersection in medical information system.
-
[14]
[PDF] Secure Collaborative Machine Learning | VisaDuring training our secret join/private set intersection techniques can allow the parties to join their respective datasets and then feed these into an ...
-
[15]
multiparty/psi-pilot-masstech: Private Set Intersection demo ... - GitHubIn this banks can query each other's list of fraudulent customers, while only learning if their query is a match or not. The first solution is a peer-to-peer ...
-
[16]
Privately computing set-maximal matches in genomic dataJul 21, 2020 · We design a new depth-optimized algorithm for computing set-maximal matches between a database of aligned genetic sequences and the DNA of an individual.
-
[17]
Private queries on encrypted genomic data - PMC - NIHOur protocol combines state-of-the-art techniques from homomorphic encryption and private set intersection protocols to minimize the computational and ...
-
[18]
Private Intersection-Sum Protocols with Applications to Attributing ...The problem we consider is privately computing aggregate conversion rate of advertising campaigns. This underlying functionality can be abstracted as PrivateMissing: audience matching
-
[19]
PAIR Up With First Party Data - IAB Tech LabIAB Tech Lab PAIR will describe the data clean room processes and the privacy enhancing technologies (PETs) that enable a matching operation between two parties ...
- [20]
-
[21]
Linear-Complexity Private Set Intersection Protocols Secure in ...In this paper, we construct PSI and Authorized PSI (APSI) protocols secure in the malicious model under standard cryptographic assumptions, with both linear ...
-
[22]
Security Against Covert Adversaries: Efficient Protocols for Realistic ...We stress that in our definition, we quantify over all (possibly malicious) adversaries and do not assume that the adversary behaves in any particular way.
-
[23]
Efficient Protocols for Set Intersection and Pattern Matching with ...We also present a protocol for set intersection that is fully simulatable in the model of covert adversaries. Loosely speaking, this means that a malicious ...
-
[24]
[PDF] Faster Private Set Intersection Based on OT Extension - USENIXAug 20, 2014 · Abstract. Private set intersection (PSI) allows two parties to com- pute the intersection of their sets without revealing any.
-
[25]
Non-Interactive Private Set Intersection From Functional EncryptionPrivate Set Intersection is a cryptographic scheme that helps two parties, Alice and Bob, to find the intersection of their input sets A and B while revealing ...
-
[26]
Authenticated Multi-Party Quantum Private Set Intersection ... - MDPIIn QPSI, multiple parties aim to compute the intersection of their private data sets without revealing any information beyond the intersection itself.
-
[27]
[PDF] Efficient Circuit-based PSI via Cuckoo HashingThe proof technique presented in the full version for analyzing Cuckoo hashing in two dimensions is new and can be generalized to analyzing standard. Cuckoo ...
-
[28]
[PDF] When Private Set Intersection Meets Big Data: An Efficient and ...It has linear complexity and relies mostly on efficient symmetric key operations. It has high scalability due to the fact that most operations can be ...
-
[29]
[PDF] Private Set Intersection with Linear Communication from General ...Oct 2, 2019 · Our protocol is simple, generic and benefits from the permutation- hashing optimizations of Pinkas et al. (USENIX 2015) and the Batched,.
-
[30]
Phasing: Private Set Intersection Using Permutation-based HashingWe describe a new approach for designing PSI protocols based on permutation-based hashing, which enables to reduce the length of items mapped to bins.Missing: 2010 | Show results with:2010
-
[31]
Privacy-Preserving Set Operations - SpringerLinkWe design efficient, secure, and composable methods to enable privacy-preserving computation of the union, intersection, and element reduction operations.
-
[32]
Post-quantum secure multi-party private set-intersection in star ...This paper addresses the issue by presenting the first post-quantum MPSI protocol in the so-called star network topology, using lattice-based public key ...
-
[33]
Efficient Oblivious Pseudorandom Function with Applications to ...Abstract. An Oblivious Pseudorandom Function (OPRF) [15] is a two-party protocol between sender S and receiver R for securely computing a pseudoran-.
-
[34]
[PDF] Malicious-Secure Private Set Intersection via Dual ExecutionAug 9, 2017 · This simulation based paradigm defines security with respect to two interaction,. • Real interaction: a malicious adversary A attacks the ...
-
[35]
An Efficient Outsourced Oblivious Transfer Extension Protocol and ...Dec 5, 2020 · In this paper, we propose a generic outsourced OT extension protocol ( ) that outsources all the asymmetric operations of the sender to a semihonest server.
-
[36]
[PDF] Privacy-Preserving Set Operations - CMU School of Computer ScienceIn this paper, we propose efficient techniques for privacy-preserving operations on multisets. By employing the mathematical properties of polynomials, we build ...
-
[37]
[PDF] O-Ring and K-Star: Efficient Multi-party Private Set IntersectionAug 16, 2024 · In this paper, we propose two efficient. mPSI protocols that are secure against an arbitrary number of colluding parties. In the protocol O-Ring ...<|control11|><|separator|>
-
[38]
Malicious-Secure Threshold Multi-Party Private Set Intersection for ...Within SMPC, Private Set Intersection (PSI) serves as a specialized application, allowing parties to determine the common elements of their respective private ...
-
[39]
[PDF] Scalable Multi-Party Private Set-IntersectionThis protocol consists of a preprocessing phase that uses some- what homomorphic encryption scheme to generate correlated randomness, that is later used in an ...
-
[40]
A Parallel Multi-Party Privacy-Preserving Record Linkage Method ...Jun 14, 2024 · We propose a parallel multi-party PPRL method based on consortium blockchain technology which can effectively address the issue of semi-trusted third-party ...
-
[41]
Record linkage based patient intersection cardinality for rare ...Oct 8, 2022 · In this work, we extend MainSEL to allow the record linkage based calculation of the number of common patients between institutions.
-
[42]
[PDF] Efficient Unbalanced Private Set Intersection Cardinality and User ...Aug 11, 2023 · An unbalanced private set intersection cardinality (PSI-. CA) protocol is a protocol to securely get the intersection cardinality of two sets X ...
-
[43]
PSI-Stats: Private Set Intersection Protocols Supporting Secure ...May 28, 2020 · In this paper, we present protocols which enable the secure computations of statistical functions over PSI, which we collectively termed PSI-Stats.Missing: Troncoso- Pastoriza
-
[44]
Record linkage based patient intersection cardinality for rare ...Oct 8, 2022 · In this work, we extend MainSEL to allow the record linkage based calculation of the number of common patients between institutions.