WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Journal of Computer Science and Technology
  2. Journal of Computer Science and Technology : Volume 22
  3. Journal of Computer Science and Technology : Volume 22, Issue 6, November 2007
  4. A Protocol for a Private Set-Operation
Loading...

Please wait, while we are loading the content...

Journal of Computer Science and Technology : Volume 32
Journal of Computer Science and Technology : Volume 31
Journal of Computer Science and Technology : Volume 30
Journal of Computer Science and Technology : Volume 29
Journal of Computer Science and Technology : Volume 28
Journal of Computer Science and Technology : Volume 27
Journal of Computer Science and Technology : Volume 26
Journal of Computer Science and Technology : Volume 25
Journal of Computer Science and Technology : Volume 24
Journal of Computer Science and Technology : Volume 23
Journal of Computer Science and Technology : Volume 22
Journal of Computer Science and Technology : Volume 22, Issue 6, November 2007
Revocable Ring Signature
Wavelet Based Image Authentication and Recovery
Short Group Signatures Without Random Oracles
A Protocol for a Private Set-Operation
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Two and Length pq
Simulation and Visualisation of Functional Landscapes: Effects of the Water Resource Competition Between Plants
Simple Reconstruction of Tree Branches from a Single Range Image
A Fast Ambient Occlusion Method for Real-Time Plant Rendering
Human Gait Recognition Based on Kernel PCA Using Projections
Mining Causality for Explanation Knowledge from Text
Fiducial Marker Based on Projective Invariant for Augmented Reality
An Improved HEAPSORT Algorithm with nlogn − 0.788928n Comparisons in the Worst Case
A Differential Evolution Approach for Protein Folding Using a Lattice Model
Generating Combinations by Three Basic Operations
Journal of Computer Science and Technology : Volume 22, Issue 5, September 2007
Journal of Computer Science and Technology : Volume 22, Issue 4, July 2007
Journal of Computer Science and Technology : Volume 22, Issue 3, May 2007
Journal of Computer Science and Technology : Volume 22, Issue 2, March 2007
Journal of Computer Science and Technology : Volume 22, Issue 1, January 2007
Journal of Computer Science and Technology : Volume 21
Journal of Computer Science and Technology : Volume 20
Journal of Computer Science and Technology : Volume 19
Journal of Computer Science and Technology : Volume 18
Journal of Computer Science and Technology : Volume 17
Journal of Computer Science and Technology : Volume 16
Journal of Computer Science and Technology : Volume 15
Journal of Computer Science and Technology : Volume 14
Journal of Computer Science and Technology : Volume 13
Journal of Computer Science and Technology : Volume 12

Similar Documents

...
T-Private and t-Secure Auctions

Article

...
Secure Two-Party Computational Geometry

Article

...
Secure Two-Party Point-Circle Inclusion Problem

Article

...
An improved error handling method in SNMPv2 protocol operations

Article

...
A Secure Scalar Product Protocol Against Malicious Adversaries

Article

...
Special announcement

Article

...
A Secure Elliptic Curve-Based RFID Protocol

Article

...
Multiparty authentication services and key agreement protocols with semi-trusted third party

Article

...
Distributed oblivious function evaluation and its applications

Article

A Protocol for a Private Set-Operation

Content Provider Springer Nature Link
Author Li, Rong Hua Wu, Chuan Kun
Copyright Year 2007
Abstract A new private set-operation problem is proposed. Suppose there are n parties with each owning a secret set. Let one of them, say P, be the leader, S be P’s secret set, and t (less than n − 1) be a threshold value. For each element w of S, if w appears more than t times in the rest parties’ sets, then P learns which parties’ sets include w, otherwise P cannot know whether w appears in any party’s set. For this problem, a secure protocol is proposed in the semi-honest model based on semantically secure homomorphic encryption scheme, secure sharing scheme, and the polynomial representation of sets. The protocol only needs constant rounds of communication.
Starting Page 822
Ending Page 829
Page Count 8
File Format PDF
ISSN 10009000
Journal Journal of Computer Science and Technology
Volume Number 22
Issue Number 6
e-ISSN 18604749
Language English
Publisher Springer US
Publisher Date 2007-11-17
Publisher Place Boston
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword secure multiparty computation private set-operation secure protocol Computer Science Software Engineering Theory of Computation Data Structures, Cryptology and Information Theory Artificial Intelligence (incl. Robotics) Information Systems Applications (incl.Internet)
Content Type Text
Resource Type Article
Subject Theoretical Computer Science Computational Theory and Mathematics Computer Science Applications Software Hardware and Architecture
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...