{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:30:11Z","timestamp":1777390211651,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["2101052"],"award-info":[{"award-number":["2101052"]}]},{"name":"NSF","award":["2031799"],"award-info":[{"award-number":["2031799"]}]},{"name":"NSF","award":["2115075"],"award-info":[{"award-number":["2115075"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484772","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1151-1165","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Simple, Fast Malicious Multiparty Private Set Intersection"],"prefix":"10.1145","author":[{"given":"Ofri","family":"Nevo","sequence":"first","affiliation":[{"name":"Open University of Israel, Ra'anana, Israel"}]},{"given":"Ni","family":"Trieu","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Avishay","family":"Yanai","sequence":"additional","affiliation":[{"name":"VMware Research, Herzliya, Israel"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Assessing disease exposure risk with location data: A proposal for cryptographic preservation of privacy","author":"Berke Alex","year":"2020","unstructured":"Alex Berke, Michiel Bakker, Praneeth Vepakomma, Kent Larson, and Alex 'Sandy' Pentland. Assessing disease exposure risk with location data: A proposal for cryptographic preservation of privacy, 2020."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Nishanth Chandran Nishka Dasgupta Divya Gupta Sai Lakshmi Bhavana Obbattu Sruthi Sekar and Akash Shah. Efficient linear multiparty psi and extensions to circuit\/quorum psi. Cryptology ePrint Archive Report 2021\/172 2021. https:\/\/eprint.iacr.org\/2021\/172.","DOI":"10.1145\/3460120.3484591"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Melissa Chase and Peihan Miao. Private set intersection in the internet setting from lightweight oblivious PRF. In Daniele Micciancio and Thomas Ristenpart editors CRYPTO 2020 Part III volume 12172 of LNCS pages 34--63. Springer Heidelberg August 2020.","DOI":"10.1007\/978-3-030-56877-1_2"},{"key":"e_1_3_2_1_4_1","volume-title":"Multi-party privacy-preserving set intersection with quasi-linear complexity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A(8):1366--1378","author":"Cheon Jung Hee","year":"2012","unstructured":"Jung Hee Cheon, Stanislaw Jarecki, and Jae Hong Seo. Multi-party privacy-preserving set intersection with quasi-linear complexity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A(8):1366--1378, 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2025968.2025979"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0037"},{"key":"e_1_3_2_1_7_1","unstructured":"Samuel Dittmer Yuval Ishai Steve Lu Rafail Ostrovsky Mohamed Elsabagh Nikolaos Kiourtis Brian Schulte and Angelos Stavrou. Function secret sharing for psi-ca: With applications to private contact tracing. Cryptology ePrint Archive Report 2020\/1599 2020. https:\/\/eprint.iacr.org\/2020\/1599."},{"key":"e_1_3_2_1_8_1","first-page":"789","volume-title":"CCS","author":"Dong Changyu","year":"2013","unstructured":"Changyu Dong, Liqun Chen, and Zikai Wen. When private set intersection meets big data: an efficient and scalable protocol. In Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, editors, CCS, pages 789--800. ACM, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Thai Duong Duong Hieu Phan and Ni Trieu. Catalic: Delegated PSI cardinality with applications to contact tracing. In Shiho Moriai and Huaxiong Wang editors ASIACRYPT 2020 Part III volume 12493 of LNCS pages 870--899. Springer Heidelberg December 2020.","DOI":"10.1007\/978-3-030-64840-4_29"},{"key":"e_1_3_2_1_10_1","unstructured":"Aner Ben Efraim Olga Nissenbaum Eran Omri and Anat Paskin-Cherniavsky. Psimple: Practical multiparty maliciously-secure private set intersection. Cryptology ePrint Archive Report 2021\/122 2021. https:\/\/eprint.iacr.org\/2021\/122."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_17"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Gayathri Garimella Benny Pinkas Mike Rosulek Ni Trieu and Avishay Yanai. Oblivious key-value stores and amplification for private set intersection. Cryptology ePrint Archive Report 2021\/883 2021. https:\/\/ia.cr\/2021\/883.","DOI":"10.1007\/978-3-030-84245-1_14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_6"},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/blog.google\/technology\/safety-security\/password-checkup","year":"2019","unstructured":"Google. https:\/\/blog.google\/technology\/safety-security\/password-checkup. 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23159"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_8"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_13"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00031"},{"key":"e_1_3_2_1_20_1","volume-title":"FC 2014, Christ Church, Barbados, March 3--7, 2014","author":"Kamara Seny","year":"2014","unstructured":"Seny Kamara, Payman Mohassel, Mariana Raykova, and Seyed Saeed Sadeghian. Scaling private set intersection to billion-element sets. In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3--7, 2014, Revised Selected Papers, pages 195--215, 2014."},{"key":"e_1_3_2_1_21_1","first-page":"241","volume-title":"Proceedings","author":"Kissner Lea","year":"2005","unstructured":"Lea Kissner and Dawn Xiaodong Song. Privacy-preserving set operations. In Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14--18, 2005, Proceedings, pages 241--257, 2005."},{"key":"e_1_3_2_1_22_1","first-page":"818","volume-title":"ACM CCS 2016","author":"Kolesnikov Vladimir","year":"2016","unstructured":"Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. Efficient batched oblivious PRF with applications to private set intersection. In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi, editors, ACM CCS 2016, pages 818--829. ACM Press, October 2016."},{"key":"e_1_3_2_1_23_1","volume-title":"CCS","author":"Kolesnikov Vladimir","year":"2017","unstructured":"Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, and Ni Trieu. Practical multi-party private set intersection from symmetric-key techniques. In CCS, 2017."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345661"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0657-4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25645-0_26"},{"key":"e_1_3_2_1_27_1","first-page":"591","volume-title":"CCS","author":"Mohassel Payman","year":"2015","unstructured":"Payman Mohassel, Mike Rosulek, and Ye Zhang. Fast and secure three-party computation: The garbled circuit approach. In Indrajit Ray, Ninghui Li, and Christopher Kruegel, editors, CCS, pages 591--602, 2015."},{"key":"e_1_3_2_1_28_1","unstructured":"Duong Tung Nguyen and Ni Trieu. Mpccache: Privacy-preserving multi-party cooperative cache sharing at the edge. Cryptology ePrint Archive Report 2021\/317 2021. https:\/\/eprint.iacr.org\/2021\/317."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Benny Pinkas Mike Rosulek Ni Trieu and Avishay Yanai. PSI from PaXoS: Fast malicious private set intersection. In Anne Canteaut and Yuval Ishai editors EUROCRYPT 2020 Part II volume 12106 of LNCS pages 739--767. Springer Heidelberg May 2020.","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_5"},{"key":"e_1_3_2_1_31_1","first-page":"235","volume-title":"EUROCRYPT","volume":"10210","author":"Rindal Peter","year":"2017","unstructured":"Peter Rindal and Mike Rosulek. Improved private set intersection against malicious adversaries. In Jean-S\u00e9 bastien Coron and Jesper Buus Nielsen, editors, EUROCRYPT, volume 10210, pages 235--259, 2017."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_31"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2007.59"},{"key":"e_1_3_2_1_34_1","first-page":"47","volume-title":"ACSC","author":"Sang Yingpeng","year":"2008","unstructured":"Yingpeng Sang and Hong Shen. Privacy preserving set intersection based on bilinear groups. In ACSC, pages 47--54, 2008."},{"key":"e_1_3_2_1_35_1","volume-title":"Epione: Lightweight contact tracing with strong privacy. CoRR, abs\/2004.13293","author":"Trieu Ni","year":"2020","unstructured":"Ni Trieu, Kareem Shehata, Prateek Saxena, Reza Shokri, and Dawn Song. Epione: Lightweight contact tracing with strong privacy. CoRR, abs\/2004.13293, 2020."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358927"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484772","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484772","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:58Z","timestamp":1763499058000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484772"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":36,"alternative-id":["10.1145\/3460120.3484772","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484772","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}