You can compute what you have in common with untrusted parties, without disclosing what you have. This is an implementation of a cryptographic protocol that is tailored for privacy-preserving set intersection.
Categories
CryptographyLicense
BSD LicenseFollow FNP privacy-preserving set intersection
Other Useful Business Software
    
                    
                    Build Securely on Azure with Proven Frameworks
                    
                    
                
            
                            Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
                        
                    Rate This Project
Login To Rate This Project
    User Reviews
            Be the first to post a review of FNP privacy-preserving set intersection!