Author of the publication

Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.

, , , , and . USENIX Security Symposium, page 911-928. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conditional Encrypted Mapping and Comparing Encrypted Numbers., and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 206-220. Springer, (2006)SSTP: A scalable and secure transport protocol for smart grid data collection., , , and . SmartGridComm, page 161-166. IEEE, (2011)Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens.. TCC, volume 5978 of Lecture Notes in Computer Science, page 327-342. Springer, (2010)Improved Garbled Circuit: Free XOR Gates and Applications., and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 486-498. Springer, (2008)Password Mistyping in Two-Factor-Authenticated Key Exchange., and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 702-714. Springer, (2008)Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams., , , , and . DISC, volume 7611 of Lecture Notes in Computer Science, page 431-432. Springer, (2012)Attribute-based Key Exchange with General Policies., , , , and . ACM Conference on Computer and Communications Security, page 1451-1463. ACM, (2016)Stacked Garbling for Disjunctive Zero-Knowledge Proofs., and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 569-598. Springer, (2020)Auditable, Available and Resilient Private Computation on the Blockchain via MPC., , , , , , , and . CSCML, volume 13301 of Lecture Notes in Computer Science, page 281-299. Springer, (2022)Scalable Private Set Union from Symmetric-Key Techniques., , , and . ASIACRYPT (2), volume 11922 of Lecture Notes in Computer Science, page 636-666. Springer, (2019)