Steganography is the art of hiding information. In this blog post we’ll see how neural networks can be used as a vehicle for covert communication.
In a previous post we looked at the Diffie-Hellman key exchange protocol. In this post, we’ll see how to use that as a basis to construct a private set intersection protocol.
This post introduces the Diffie-Hellman key exchange protocol. We can build a private set intersection protocol on top of the Diffie-Hellman key exchange protocol, as we’ll see next time.
In this post we’ll see how a private set intersection protocol can be built using the Paillier cryptosystem.
This post introduces the Paillier cryptosystem, which is a partial homomorphic encryption scheme. In a subsequent post we’ll see how this can be used as the basis for a private set intersection protocol.