메뉴 건너뛰기




Volumn 4258 LNCS, Issue , 2006, Pages 277-294

Honest-verifier private disjointness testing without random oracles

Author keywords

Anonymous login; Private data mining; Private disjointness testing; Private intersection cardinality; Subgroup decision assumption

Indexed keywords

CARDINALITIES; DISJOINTNESS; PRIVATE DATA; PRIVATE DATA MINING; PRIVATE DISJOINTNESS TESTING;

EID: 56749157577     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11957454_16     Document Type: Conference Paper
Times cited : (39)

References (22)
  • 2
    • 0027726717 scopus 로고    scopus 로고
    • Bellare, M., and Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In CCS (1993), ACM Press, pp. 62-73.
    • Bellare, M., and Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In CCS (1993), ACM Press, pp. 62-73.
  • 3
    • 24144433396 scopus 로고    scopus 로고
    • Boneh, D., Goh, E.-J., and Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In TCC (2005), J. Kilian, Ed., 3378 of LNCS, pp. 325-341.
    • Boneh, D., Goh, E.-J., and Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In TCC (2005), J. Kilian, Ed., vol. 3378 of LNCS, pp. 325-341.
  • 4
    • 84957610863 scopus 로고    scopus 로고
    • Proving in zero-knowledge that a number is the product of two safe primes
    • EUROCRYPT'99 , J. Stern, Ed, of
    • Camenisch, J., and Michels, M. Proving in zero-knowledge that a number is the product of two safe primes. In EUROCRYPT'99 (1999), J. Stern, Ed., vol. 1592 of LNCS, pp. 107-122.
    • (1999) LNCS , vol.1592 , pp. 107-122
    • Camenisch, J.1    Michels, M.2
  • 5
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • CRYPTO '03, of
    • Camenisch, J., and Shoup, V. Practical verifiable encryption and decryption of discrete logarithms. In CRYPTO '03 (2003), vol. 2729 of LNCS, pp. 126-144.
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 6
    • 84880897758 scopus 로고    scopus 로고
    • Universally composable commitments
    • CRYPTO '01 , J. Kilian, Ed, of
    • Canetti, R., and Fischlin, M. Universally composable commitments. In CRYPTO '01 (2001), J. Kilian, Ed., vol. 2139 of LNCS, pp. 19-40.
    • (2001) LNCS , vol.2139 , pp. 19-40
    • Canetti, R.1    Fischlin, M.2
  • 7
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • July
    • Canetti, R., Goldreich, O., and Halevi, S. The random oracle methodology, revisited. Journal of the ACM 51, 4 (July 2004), 557-594.
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 8
    • 0036038991 scopus 로고    scopus 로고
    • Canetti, R., Lindell, Y., Ostrovsky, R., and Sahai, A. Universally composable two-party and multi-party secure computation. In STOC (2002), J. H. Reif, Ed., ACM Press, pp. 495-503.
    • Canetti, R., Lindell, Y., Ostrovsky, R., and Sahai, A. Universally composable two-party and multi-party secure computation. In STOC (2002), J. H. Reif, Ed., ACM Press, pp. 495-503.
  • 9
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi- authority election scheme
    • EUROCRYPT '97 , W. Fumy, Ed, of
    • Cramer, R., Gennaro, R., and Schoenmakers, B. A secure and optimally efficient multi- authority election scheme. In EUROCRYPT '97 (1997), W. Fumy, Ed., vol. 1233 of LNCS, pp. 103-118.
    • (1997) LNCS , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 10
    • 84937437506 scopus 로고    scopus 로고
    • Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor
    • CRYPTO '02 , M. Yung, Ed, of
    • Damgård, I., and Nielsen, J. B. Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. In CRYPTO '02 (2002), M. Yung, Ed., vol. 2442 of LNCS, pp. 581-596.
    • (2002) LNCS , vol.2442 , pp. 581-596
    • Damgård, I.1    Nielsen, J.B.2
  • 11
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • EUROCRYPT '04, of
    • Freedman, M. J., Nissim, K., and Pinkas, B. Efficient private matching and set intersection. In EUROCRYPT '04 (2004), vol. 3027 of LNCS, pp. 1-19.
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 12
    • 0023545076 scopus 로고
    • How to play any mental game
    • January, ACM Press, pp
    • Goldreich, O., Micali, S., and Wigderson, A. How to play any mental game. In STOC (January 1987), ACM Press, pp. 218-229.
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 13
    • 33746072569 scopus 로고    scopus 로고
    • Perfect non-interactive zero knowledge for NP
    • Groth, J., Ostrovsky, R., and Sahai, A. Perfect non-interactive zero knowledge for NP. In EUROCRYPT '06 (2006), vol. 4004, pp. 339-358.
    • (2006) EUROCRYPT '06 , vol.4004 , pp. 339-358
    • Groth, J.1    Ostrovsky, R.2    Sahai, A.3
  • 14
    • 26444553355 scopus 로고    scopus 로고
    • Testing disjointness of private datasets
    • Financial Cryptography, of
    • Kiayias, A., and Mitrofanova, A. Testing disjointness of private datasets. In Financial Cryptography (2005), vol. 3570 of LNCS, pp. 109-124.
    • (2005) LNCS , vol.3570 , pp. 109-124
    • Kiayias, A.1    Mitrofanova, A.2
  • 15
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • CRYPTO '05 , V. Shoup, Ed, of
    • Kissner, L., and Song, D. Privacy-preserving set operations. In CRYPTO '05 (2005), V. Shoup, Ed., vol. 3621 of LNCS, pp. 241-257.
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 17
    • 0032669864 scopus 로고    scopus 로고
    • Naor, M., and Pinkas, B. Oblivious transfer and polynomial evaluation. In STOC (May 1999), T. Leighton, Ed., ACM Press, pp. 245-254.
    • Naor, M., and Pinkas, B. Oblivious transfer and polynomial evaluation. In STOC (May 1999), T. Leighton, Ed., ACM Press, pp. 245-254.
  • 18
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • EUROCRYPT '99, of
    • Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT '99 (1999), vol. 1592 of LNCS, pp. 223-238.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 19
    • 84937439454 scopus 로고    scopus 로고
    • Trapdooring discrete logarithms on elliptic curves over rings
    • ASIACRYPT '00 , T. Okamoto, Ed, of
    • Paillier, P. Trapdooring discrete logarithms on elliptic curves over rings. In ASIACRYPT '00 (2000), T. Okamoto, Ed., vol. 1976 of LNCS, pp. 573-584.
    • (2000) LNCS , vol.1976 , pp. 573-584
    • Paillier, P.1
  • 20
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • CRYPTO '91, of
    • Pedersen, T. P. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91 (1991), vol. 576 of LNCS, pp. 129-140.
    • (1991) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 21
    • 84958777058 scopus 로고    scopus 로고
    • Private information retrieval based on the private information retrieval based on subgroup membership problem
    • Australasian Conf. on Info. Security and Privacy, of
    • Yamamura, A., and Saito, T. Private information retrieval based on the private information retrieval based on subgroup membership problem. In Australasian Conf. on Info. Security and Privacy (2001), vol. 2119 of LNCS, pp. 206-220.
    • (2001) LNCS , vol.2119 , pp. 206-220
    • Yamamura, A.1    Saito, T.2
  • 22
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE Press, pp
    • Yao, A. C. How to generate and exchange secrets. In Foundations of Computer Science - FOCS (1986), IEEE Press, pp. 162-167.
    • (1986) Foundations of Computer Science - FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.