ReSet: a protocol for private matching
Abstract
References
Index Terms
- ReSet: a protocol for private matching
Recommendations
Preventing sensitive relationships disclosure for better social media preservation
A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly ...
Unconditionally secure disjointness tests for private datasets
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals ...
Efficient Disjointness Tests for Private Datasets
ACISP '08: Proceedings of the 13th Australasian conference on Information Security and PrivacyWe present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/5695053e-a880-430e-98d9-1fbc276db69f/2701126.cover.jpg)
- Conference Chairs:
- Dongsoo S. Kim,
- Sang-wook Kim,
- General Chairs:
- Suk-Han Lee,
- Lajos Hanzo,
- Roslan Ismail
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Indus- trial Core Technology Development Program (MOTIE, Korea)
- MSIP (Ministry of Sci- ence, ICT & Future Planning), Korea
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 92Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in