Testing Disjointness of Private Datasets
@inproceedings{Kiayias2005TestingDO, title={Testing Disjointness of Private Datasets}, author={Aggelos Kiayias and Antonina Mitrofanova}, booktitle={Financial Cryptography}, year={2005} }
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we consider the above problem in the setting where Alice and Bob wish to disclose no information to each other about their sets beyond the single bit: “whether the intersection is empty or not.” This problem has many applications in commercial settings where two mutually distrustful parties wish to decide with minimum… CONTINUE READING
Topics from this paper.
Citations
Publications citing this paper.
SHOWING 1-10 OF 28 CITATIONS
Privacy-preserving multi-set operations
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED
Privacy-Preserving Distributed Set Intersection
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED
New foundations for efficient authentication, commutative cryptography, and private disjointness testing
VIEW 8 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED
A Model for Mobile Social Network Growth
VIEW 1 EXCERPT
CITES METHODS
Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing
VIEW 1 EXCERPT
CITES BACKGROUND
Private Set Projections & Variants
VIEW 1 EXCERPT
CITES BACKGROUND
Avatar: Mobile Distributed Computing in the Cloud
VIEW 1 EXCERPT
CITES METHODS
Privacy and Cooperation in Peer-to-Peer Systems
VIEW 1 EXCERPT
CITES METHODS
Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching
VIEW 1 EXCERPT
CITES BACKGROUND
References
Publications referenced by this paper.
SHOWING 1-10 OF 21 REFERENCES
Efficient Private Matching and Set Intersection
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL
Practical Verifiable Encryption and Decryption of Discrete Logarithms
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL
Mielikinen, On Secure Scalar Product Computation for Privacy-Preserving Data Mining
VIEW 1 EXCERPT
Oblivious Transfer and Polynomial Evaluation
VIEW 2 EXCERPTS