{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:30:51Z","timestamp":1777390251210,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609376","type":"print"},{"value":"9789819609383","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0938-3_2","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T18:19:57Z","timestamp":1733941197000},"page":"36-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Efficient Fuzzy Private Set Intersection from\u00a0Fuzzy Mapping"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8992-651X","authenticated-orcid":false,"given":"Ying","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0489-9412","authenticated-orcid":false,"given":"Lin","family":"Qi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8128-7872","authenticated-orcid":false,"given":"Xiang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6541-690X","authenticated-orcid":false,"given":"Yuanchao","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2277-7039","authenticated-orcid":false,"given":"Longxin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"van Baarsen, A., Pu, S.: Fuzzy private set intersection with large hyperballs. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024. pp. 340\u2013369. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58740-5_12","DOI":"10.1007\/978-3-031-58740-5_12"},{"key":"2_CR2","unstructured":"Bienstock, A., Patel, S., Seo, J.Y., Yeo, K.: Near-Optimal oblivious Key-Value stores for efficient PSI, PSU and Volume-Hiding Multi-Maps. In: 32nd USENIX Security Symposium (USENIX Security 23). pp. 301\u2013318. USENIX Association, Anaheim, CA (2023)"},{"key":"2_CR3","unstructured":"Bienstock, A., Patel, S., Seo, J.Y., Yeo, K.: Batch pir and labeled psi with oblivious ciphertext compression. Cryptology ePrint Archive, Paper 2024\/215 (2024), https:\/\/eprint.iacr.org\/2024\/215"},{"key":"2_CR4","unstructured":"Chakraborti, A., Fanti, G., Reiter, M.K.: Distance-Aware private set intersection. In: 32nd USENIX Security Symposium (USENIX Security 23). pp. 319\u2013336. USENIX Association, Anaheim, CA (2023)"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Chen, H., Huang, Z., Laine, K., Rindal, P.: Labeled psi from fully homomorphic encryption with malicious security. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 1223\u20131237. CCS \u201918, Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3243734.3243836","DOI":"10.1145\/3243734.3243836"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Chen, Y., Zhang, M., Zhang, C., Dong, M., Liu, W.: Private set operations from multi-query reverse private membership test. In: Tang, Q., Teague, V. (eds.) Public-Key Cryptography \u2013 PKC 2024. pp. 387\u2013416. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57725-3_13","DOI":"10.1007\/978-3-031-57725-3_13"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Chmielewski, L., Hoepman, J.H.: Fuzzy private matching (extended abstract). In: 2008 Third International Conference on Availability, Reliability and Security. pp. 327\u2013334 (2008). https:\/\/doi.org\/10.1109\/ARES.2008.170","DOI":"10.1109\/ARES.2008.170"},{"key":"2_CR8","unstructured":"Chongchitmate, W., Lu, S., Ostrovsky, R.: Approximate psi with near-linear communication. Cryptology ePrint Archive, Paper 2024\/682 (2024), https:\/\/eprint.iacr.org\/2024\/682"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Cong, K., Moreno, R.C., da\u00a0Gama, M.B., Dai, W., Iliashenko, I., Laine, K., Rosenberg, M.: Labeled PSI from homomorphic encryption with reduced computation and communication. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. pp. 1135\u20131150. CCS \u201921, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3460120.3484760","DOI":"10.1145\/3460120.3484760"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Duong, T., Phan, D.H., Trieu, N.: Catalic: Delegated psi cardinality with applications to contact tracing. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2020. pp. 870\u2013899. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64840-4_29","DOI":"10.1007\/978-3-030-64840-4_29"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology - EUROCRYPT 2004. pp. 1\u201319. Springer Berlin Heidelberg, Berlin, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_1","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Garimella, G., Pinkas, B., Rosulek, M., Trieu, N., Yanai, A.: Oblivious key-value stores and amplification for private set intersection. In: Advances in Cryptology \u2013 CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16\u201320, 2021, Proceedings, Part II. pp. 395\u2013425. Springer-Verlag, Berlin, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-030-84245-1_14","DOI":"10.1007\/978-3-030-84245-1_14"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Garimella, G., Rosulek, M., Singh, J.: Structure-aware private set intersection, with applications to fuzzy matching. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology \u2013 CRYPTO 2022. pp. 323\u2013352. Springer Nature Switzerland, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15802-5_12","DOI":"10.1007\/978-3-031-15802-5_12"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Garimella, G., Rosulek, M., Singh, J.: Malicious secure, structure-aware private set intersection. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2023. pp. 577\u2013610. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_19","DOI":"10.1007\/978-3-031-38557-5_19"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Indyk, P., Woodruff, D.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography. pp. 245\u2013264. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_13","DOI":"10.1007\/11681878_13"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Ion, M., Kreuter, B., Nergiz, A.E., Patel, S., Saxena, S., Seth, K., Raykova, M., Shanahan, D., Yung, M.: On deploying secure computing: Private intersection-sum-with-cardinality. In: 2020 IEEE European Symposium on Security and Privacy (EuroS &P). pp. 370\u2013389 (2020). https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00031","DOI":"10.1109\/EuroSP48549.2020.00031"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Kolesnikov, V., Kumaresan, R., Rosulek, M., Trieu, N.: Efficient batched oblivious prf with applications to private set intersection. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 818\u2013829. CCS \u201916, Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2976749.2978381","DOI":"10.1145\/2976749.2978381"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Manku, G.S., Jain, A., Das\u00a0Sarma, A.: Detecting near-duplicates for web crawling. In: Proceedings of the 16th International Conference on World Wide Web. p. 141-150. WWW \u201907, Association for Computing Machinery, New York, NY, USA (2007). https:\/\/doi.org\/10.1145\/1242572.1242592","DOI":"10.1145\/1242572.1242592"},{"issue":"4","key":"2_CR19","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1021\/acsomega.7b00053","volume":"2","author":"M Mohammadi-Kambs","year":"2017","unstructured":"Mohammadi-Kambs, M., H\u00f6lz, K., Somoza, M.M., Ott, A.: Hamming distance as a concept in dna molecular recognition. ACS Omega 2(4), 1302\u20131308 (2017). https:\/\/doi.org\/10.1021\/acsomega.7b00053","journal-title":"ACS Omega"},{"key":"2_CR20","unstructured":"Patra, A., Schneider, T., Suresh, A., Yalame, H.: ABY2.0: Improved Mixed-Protocol secure Two-Party computation. In: 30th USENIX Security Symposium (USENIX Security 21). pp. 2165\u20132182. USENIX Association (2021), https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/patra"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Raghuraman, S., Rindal, P.: Blazing fast psi from improved okvs and subfield vole. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. pp. 2505\u20132517. CCS \u201922, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3548606.3560658","DOI":"10.1145\/3548606.3560658"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Rindal, P., Schoppmann, P.: Vole-psi: Fast oprf and circuit-psi from vector-ole. In: Canteaut, A., Standaert, F.X. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2021. pp. 901\u2013930. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77886-6_31","DOI":"10.1007\/978-3-030-77886-6_31"},{"key":"2_CR23","unstructured":"Uzun, E., Chung, S.P., Kolesnikov, V., Boldyreva, A., Lee, W.: Fuzzy labeled private set intersection with applications to private Real-Time biometric search. In: 30th USENIX Security Symposium (USENIX Security 21). pp. 911\u2013928. USENIX Association (2021)"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Uzun, E., Yagemann, C., Chung, S., Kolesnikov, V., Lee, W.: Cryptographic key derivation from biometric inferences for remote authentication. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. p. 629-643. ASIA CCS \u201921, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3433210.3437512","DOI":"10.1145\/3433210.3437512"},{"key":"2_CR25","unstructured":"Wu, M., Yuen, T.H.: Efficient unbalanced private set intersection cardinality and user-friendly privacy-preserving contact tracing. In: 32nd USENIX Security Symposium (USENIX Security 23). pp. 283\u2013300. USENIX Association, Anaheim, CA (2023)"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Ye, Q., Steinfeld, R., Pieprzyk, J., Wang, H.: Efficient fuzzy matching and intersection on private datasets. In: Lee, D., Hong, S. (eds.) Information, Security and Cryptology \u2013 ICISC 2009. pp. 211\u2013228. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14423-3_15","DOI":"10.1007\/978-3-642-14423-3_15"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0938-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T19:29:18Z","timestamp":1733945358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0938-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819609376","9789819609383"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0938-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}