Recently there has been a significant amount of work on privacy-preserving set operations, including: set intersection [14,6,21,9], testing set disjointness [17], multi-set operations [18], and set union [16,1,18]. In this paper, we introduce novel protocols for privacy-preserving set union in the malicious adversary model. More specifically, each participant inputs a set of values, and at the end of the protocol, each participant learns the items that are in at least one participant's set without learning the frequency of the items or which participant(s) contributed specific items. To our knowledge our protocol is the most efficient privacy-preserving set union protocol for the malicious adversary model to date. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Frikken, K. (2007). Privacy-preserving set union. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4521 LNCS, pp. 237–252). Springer Verlag. https://doi.org/10.1007/978-3-540-72738-5_16
Mendeley helps you to discover research relevant for your work.