Download now Free registration required
Secure set intersection protocols are the core building block for a manifold of privacy-preserving applications. In their basic form, secure protocols for set intersection follow from general feasibility results for secure two-party computation. However, efficiency requirements for practical deployment have recently incited efforts to design dedicated protocols which are significantly more efficient. In a recent work, Hazay and Lindell (ACM CCS 2008) introduced the idea of using trusted hardware tokens for the set intersection problem, devising protocols which improve over previous (in the standard model of two-party computation) protocols in terms of efficiency and secure composition.
- Format: PDF
- Size: 200.4 KB