메뉴 건너뛰기




Volumn 13, Issue 1, 2009, Pages

Efficient and secure protocols for privacy-preserving set operations

Author keywords

Bilinear groups; Cryptographic protocol; Noninteractive zeroknowledge argument; Privacy preservation; Set operations

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; NON-INTERACTIVE; PRIVACY PRESERVATION; SET OPERATION; ZERO KNOWLEDGE;

EID: 72449139107     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1609956.1609965     Document Type: Conference Paper
Times cited : (53)

References (35)
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • BONEH, D. AND FRANKLIN, M. 2003. Identity-based encryption from the Weil pairing. SIAM J. Comput. 32, 3, 586-615.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 11
    • 33646768523 scopus 로고    scopus 로고
    • Elliptic curve paillier schemes
    • GALBRAITH, S. D. 2002. Elliptic curve paillier schemes. J. Cryptology 15, 2,129-138.
    • (2002) J. Cryptology , vol.15 , Issue.2 , pp. 129-138
    • Galbraith, S.D.1
  • 12
    • 0003979335 scopus 로고    scopus 로고
    • Cambridge University Press, Cambridge, UK
    • GOLDREICH, O. 2004. Foundations of Cryptography, vol.2. Cambridge University Press, Cambridge, UK.
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 15
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Springer, Berlin
    • GROTH, J. AND SAHAI, A. 2008. Efficient non-interactive proof systems for bilinear groups. In Proceedings of Advances in Cryptology (EUROCRYPT'08). Springer, Berlin, 415-432.
    • (2008) Proceedings of Advances in Cryptology (EUROCRYPT'08) , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 17
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Springer, Berlin
    • KISSNER, L. AND SONG, D. 2005. Privacy-preserving set operations. In Advances in Cryptology (CRYPTO'05). Springer, Berlin, 241-257.
    • (2005) Advances in Cryptology (CRYPTO'05) , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 21
    • 4544235438 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • LINDELL, Y. 2003. Parallel coin-tossing and constant-round secure two-party computation. J. Cryptology 16, 3, 143-184.
    • (2003) J. Cryptology , vol.16 , Issue.3 , pp. 143-184
    • Lindell, Y.1
  • 22
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • MENEZES, A., VANSTONE, S., AND OKAMOTO, T. 1993. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39, 5,1639-1646.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.1    Vanstone, S.2    Okamoto, T.3
  • 24
    • 22144445920 scopus 로고    scopus 로고
    • The Weil pairing, and its efficient calculation
    • MILLER, V. 2004. The Weil pairing, and its efficient calculation. J. Cryptology 17, 4, 235-261.
    • (2004) J. Cryptology , vol.17 , Issue.4 , pp. 235-261
    • Miller, V.1
  • 25
    • 33745868262 scopus 로고    scopus 로고
    • Efficient polynomial operations in the shared-coefficients setting
    • Springer, Berlin
    • MOHASSEL, P. AND FRANKLIN, M. 2006. Efficient polynomial operations in the shared-coefficients setting. In Proceedings of Public Key Cryptography (PKC'06). Springer, Berlin, 44-57.
    • (2006) Proceedings of Public Key Cryptography (PKC'06) , pp. 44-57
    • Mohassel, P.1    Franklin, M.2
  • 30
    • 72449135459 scopus 로고    scopus 로고
    • Privacy preserving set intersection protocols based on bilinear groups
    • Austrailian Computer Society, West Melbourne, Australia
    • SANG, Y. AND SHEN, H. 2008. Privacy preserving set intersection protocols based on bilinear groups. In Proceedings of the 31st Australasian Computer Science Conference (ACSC'08). Austrailian Computer Society, West Melbourne, Australia.
    • (2008) Proceedings of the 31st Australasian Computer Science Conference (ACSC'08)
    • Sang, Y.1    Shen, H.2
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.