搜索结果: 1-5 共查到“set operations”相关记录5条 . 查询时间(0.109 秒)
Computing Private Set Operations with Linear Complexities
Bloom filters Private set operations Additively homomorphic encryption
2016/2/23
Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such protocols have an ever-in...
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Multisets non-interactive zero knowledge set operation arguments
2016/1/26
We propose a non-interactive zero knowledge pairwise multiset sum equality test (PMSET)
argument in the common reference string (CRS) model that allows a prover to show that the given
committed mult...
Zero-Knowledge Accumulators and Set Operations
zero-knowledge accumulators cryptographic accumulators secure set-operations
2015/12/31
Accumulators provide a way to succinctly represent a set with elements drawn from a given domain, using
an accumulation value. Subsequently, short proofs for the set-membership (or non-membership) of...
Verifiable Set Operations over Outsourced Databases
secure data outsourcing verifiable computation
2014/3/6
We study the problem of verifiable delegation of computation over outsourced data, whereby a powerful worker maintains a large data structure for a weak client in a verifiable way. Compared to the wel...
Efficient Set Operations in the Presence of Malicious Adversaries
Secure two-party computation Simulation-based security Set-intersection
2009/12/29
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection
and set-union, focusing on the model of malicious parties. Our main results are constan...