International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Efficient Set Operations in the Presence of Malicious Adversaries

Authors:
Carmit Hazay
Kobbi Nissim
Download:
DOI: 10.1007/978-3-642-13013-7_19
URL: https://www.iacr.org/archive/pkc2010/60560317/60560317.pdf
Search ePrint
Search Google
Presentation: Slides
Conference: PKC 2010
Video from PKC 2010
BibTeX
@inproceedings{pkc-2010-23424,
  title={Efficient Set Operations in the Presence of Malicious Adversaries},
  booktitle={Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={6056},
  pages={312-331},
  url={https://www.iacr.org/archive/pkc2010/60560317/60560317.pdf},
  doi={10.1007/978-3-642-13013-7_19},
  author={Carmit Hazay and Kobbi Nissim},
  year=2010
}