{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:35:22Z","timestamp":1725723322786},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,11]]},"DOI":"10.1109\/iwcit57101.2022.10206548","type":"proceedings-article","created":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T13:55:47Z","timestamp":1691416547000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Secure Multi-Party Private Set Intersection with Semi-Honest Nodes"],"prefix":"10.1109","author":[{"given":"Seyed Reza Hoseini","family":"Najarkolaei","sequence":"first","affiliation":[{"name":"Sharif University of Technology,Department of Electrical Engineering,Tehran,Iran"}]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[{"name":"Sharif University of Technology,Department of Electrical Engineering,Tehran,Iran"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1986.10022"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_8"},{"key":"ref14","first-page":"1","article-title":"Efficient private matching and set intersection","author":"freedman","year":"2004","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613446"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0575-0"},{"journal-title":"The apple psi system","year":"2021","author":"bhowmick","key":"ref11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/72981.72995"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_29"},{"key":"ref32","article-title":"Secure coded multi-party computation for massive matrix operations","author":"nodehi","year":"2021","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315309"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_13"},{"key":"ref16","first-page":"515","article-title":"Phasing: Private set intersection using permutation-based hashing","author":"pinkas","year":"2015","journal-title":"24th USENIX Security Symposium (USENIX Security 15)"},{"key":"ref19","article-title":"Private set intersection: Are garbled circuits better than custom protocols?","author":"huang","year":"2012","journal-title":"NDSS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134065"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437651"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"},{"key":"ref22","article-title":"Feather: lightweight multi-party updatable delegated private set intersection","author":"abadi","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455832"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT50667.2020.9163533"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT50667.2020.9163533"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ITW54588.2022.9965845"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0037"},{"journal-title":"Secure federated analytics for set intersection","year":"0","author":"elkordy","key":"ref7"},{"key":"ref9","first-page":"1447","article-title":"Mobile private contact discovery at scale","author":"kales","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315307"},{"key":"ref3","article-title":"Private intersection-sum protocol with applications to attributing aggregate ad conversions","author":"ion","year":"2017","journal-title":"Cryptology ePrint Archive"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_13"},{"key":"ref5","first-page":"797","article-title":"Faster private set intersection based on {OT} extension","author":"pinkas","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"}],"event":{"name":"2022 10th Iran Workshop on Communication and Information Theory (IWCIT)","start":{"date-parts":[[2022,5,11]]},"location":"Iran, Islamic Republic of","end":{"date-parts":[[2022,5,12]]}},"container-title":["2022 10th Iran Workshop on Communication and Information Theory (IWCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206427\/10206547\/10206548.pdf?arnumber=10206548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T13:45:02Z","timestamp":1693230302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10206548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iwcit57101.2022.10206548","relation":{},"subject":[],"published":{"date-parts":[[2022,5,11]]}}}