Author of the publication

Lightweight Threshold Private Set Intersection via Oblivious Transfer.

, , , , , and . WASA (3), volume 12939 of Lecture Notes in Computer Science, page 108-116. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Private Decision Tree Evaluation with Sublinear Communication., , , , and . AsiaCCS, page 843-857. ACM, (2022)DISCO: Dynamic Searchable Encryption with Constant State., , , , , and . IACR Cryptol. ePrint Arch., (2024)Forward Secure Conjunctive-Keyword Searchable Encryption., , , , , , and . IEEE Access, (2019)CryptoMask: Privacy-Preserving Face Recognition., , , , , , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 333-350. Springer, (2023)Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX., , , , , , and . Sci. China Inf. Sci., (2021)Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage., , , , and . ESORICS (1), volume 14344 of Lecture Notes in Computer Science, page 126-146. Springer, (2023)Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers., , , and . DASFAA (1), volume 12112 of Lecture Notes in Computer Science, page 157-177. Springer, (2020)Beyond Statistical Estimation: Differentially Private Individual Computation in the Shuffle Model., , , and . CoRR, (2024)Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication., , , , , , and . ACSAC, page 799-813. ACM, (2023)Lightweight Threshold Private Set Intersection via Oblivious Transfer., , , , , and . WASA (3), volume 12939 of Lecture Notes in Computer Science, page 108-116. Springer, (2021)