{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:43:09Z","timestamp":1725795789653},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/eurosp48549.2020.00032","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:58:11Z","timestamp":1604354291000},"page":"390-404","source":"Crossref","is-referenced-by-count":7,"title":["Differentially Private Two-Party Set Operations"],"prefix":"10.1109","author":[{"given":"Bailey","family":"Kacsmar","sequence":"first","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Basit","family":"Khurram","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Nils","family":"Lukas","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Alexander","family":"Norton","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Masoumeh","family":"Shafieinejad","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Zhiwei","family":"Shang","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Yaser","family":"Baseri","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Maryam","family":"Sepehri","sequence":"additional","affiliation":[{"name":"Universita degli studi di Milano,Dipartimento di Informatica,Milan,Italy"}]},{"given":"Simon","family":"Oya","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo,Waterloo,Canada"}]}],"member":"263","reference":[{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/09076828X"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243836"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9190-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkx1235"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2663876.2663883"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"journal-title":"Differentially private set union","year":"2020","author":"gopi","key":"ref30"},{"key":"ref33","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"journal-title":"Cheaper private set intersection via differentially private leakage Cryptology ePrint Archive Report 2019\/239","year":"2019","author":"groce","key":"ref32"},{"key":"ref10","first-page":"285","article-title":"Billion-gate secure computation with malicious adversaries","author":"kreuter","year":"2012","journal-title":"Proceedings of the 21th USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337012"},{"key":"ref1","first-page":"1","article-title":"Efficient private matching and set intersection","author":"freedman","year":"2004","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"journal-title":"Udi Weider Hashing load balancing and multiple choice","year":"2016","key":"ref39"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9098-x"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44676-1_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMra0905980"},{"key":"ref19","first-page":"145","article-title":"Extending oblivious transfers efficiently","author":"ishai","year":"2003","journal-title":"Annual International Cryptology Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"ref46","article-title":"Helib-an implementation of homomorphic encryption","author":"halevi","year":"2014","journal-title":"Cryptology ePrint Archive Report 2014\/039"},{"key":"ref24","first-page":"515","article-title":"Phasing: Private set intersection using permutation-based hashing","author":"pinkas","year":"2015","journal-title":"24th USENIX Security Symposium USENIX Security 15"},{"journal-title":"Urn Models and Their Application An Approach to Modern Discrete Probability Theory","year":"1977","author":"johnson","key":"ref45"},{"key":"ref23","first-page":"797","article-title":"Faster private set intersection based on {OT} extension","author":"pinkas","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13708-2_25"},{"journal-title":"Moxie Marlinspike The difficulty of private contact discovery A company sponsored blog post","year":"2014","key":"ref25"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_22"},{"journal-title":"Fully de-amortized cuckoo hashing for cache-oblivious dictionaries and multimaps","year":"2011","author":"goodrich","key":"ref41"},{"journal-title":"Random Allocations","year":"1978","author":"kolchin","key":"ref44"},{"key":"ref22","first-page":"401","article-title":"Spotlight: Lightweight private set intersection from sparse ot extension","author":"pinkas","year":"2019","journal-title":"Annual International Cryptology Conference"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2622218"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3154794"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59870-3_15"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_5"},{"key":"ref7","article-title":"Private set intersection: Are garbled circuits better than custom protocols","author":"huang","year":"2012","journal-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium"},{"key":"ref9","first-page":"122","article-title":"Efficient circuit-based psi with linear communication","author":"pinkas","year":"2019","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2812701"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1986.10022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"journal-title":"Google and mastercard cut a secret ad deal to track retail sales","year":"2018","author":"bergen","key":"ref5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1137\/080728743"}],"event":{"name":"2020 IEEE European Symposium on Security and Privacy (EuroS&P)","start":{"date-parts":[[2020,9,7]]},"location":"Genoa, Italy","end":{"date-parts":[[2020,9,11]]}},"container-title":["2020 IEEE European Symposium on Security and Privacy (EuroS&P)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9229479\/9230353\/09230399.pdf?arnumber=9230399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:06:02Z","timestamp":1699484762000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9230399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/eurosp48549.2020.00032","relation":{},"subject":[],"published":{"date-parts":[[2020,9]]}}}