메뉴 건너뛰기




Volumn 6052 LNCS, Issue , 2010, Pages 143-159

Practical private set intersection protocols with linear complexity

Author keywords

[No Author keywords available]

Indexed keywords

COMMON PROBLEMS; LINEAR COMPLEXITY; PRIVACY PRESERVING; SECURE PROTOCOLS; SET INTERSECTION;

EID: 77955318017     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14577-3_13     Document Type: Conference Paper
Times cited : (286)

References (24)
  • 1
    • 69949124606 scopus 로고    scopus 로고
    • Randomizable Proofs and Delegatable Anonymous Credentials
    • Halevi, S. (ed.), Springer, Heidelberg, CRYPTO 2009
    • Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable Proofs and Delegatable Anonymous Credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.5677, pp. 108-125. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 108-125
    • Belenkiy, M.1    Camenisch, J.2    Chase, M.3    Kohlweiss, M.4    Lysyanskaya, A.5    Shacham, H.6
  • 2
    • 20544449100 scopus 로고    scopus 로고
    • The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
    • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. Journal of Cryptology 16(3), 185-215 (2008)
    • (2008) Journal of Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 3
    • 35048901123 scopus 로고    scopus 로고
    • Public key Encryption with Keyword Search
    • Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg, EUROCRYPT 2004
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM Journal of Computing 32(3), 586-615 (2003)
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 5
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (Without Random Oracles)
    • Dwork, C. (ed.), Springer, Heidelberg, CRYPTO 2006
    • Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.4117, pp. 290-307. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 6
    • 67049154037 scopus 로고    scopus 로고
    • Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
    • Jarecki, S., Tsudik, G. (eds.), Springer, Heidelberg, PKC 2009
    • Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.5443, pp. 196-214. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 196-214
    • Camenisch, J.1    Kohlweiss, M.2    Rial, A.3    Sheedy, C.4
  • 7
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Boneh, D. (ed.), Springer, Heidelberg, CRYPTO 2003
    • Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.2729, pp. 126-144. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 9
    • 68949136946 scopus 로고    scopus 로고
    • Efficient Robust Private Set Intersection
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), Springer, Heidelberg, ACNS 2009
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.5536, pp. 125-142. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5536 , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 11
    • 69949150672 scopus 로고    scopus 로고
    • Privacy-preserving policy-based information transfer
    • Goldberg, I., Atallah, M.J. (eds.), Springer, Heidelberg, Privacy Enhancing Technologies
    • De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G.: Privacy-Preserving Policy-Based Information Transfer. In: Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies. LNCS, vol.5672, pp. 164-184. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5672 , pp. 164-184
    • De Cristofaro, E.1    Jarecki, S.2    Kim, J.3    Tsudik, G.4
  • 13
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: PODS 2003, pp. 211-222 (2003)
    • (2003) PODS 2003 , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 14
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Kilian, J. (ed.), Springer, Heidelberg, TCC 2005
    • Freedman, M., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.3378, pp. 303-324. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 303-324
    • Freedman, M.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 15
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg, EUROCRYPT 2004
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 16
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.), Springer, Heidelberg, TCC 2008
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol.4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 18
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
    • Reingold, O. (ed.), Springer, Heidelberg, TCC 2009
    • Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.5444, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 20
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Shoup, V. (ed.), Springer, Heidelberg, CRYPTO 2005
    • Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 21
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keyword search
    • Ogata, W., Kurosawa, K.: Oblivious keyword search. Journal of Complexity 20(2-3), 356-371 (2004)
    • (2004) Journal of Complexity , vol.20 , Issue.2-3 , pp. 356-371
    • Ogata, W.1    Kurosawa, K.2
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.), Springer, Heidelberg, EUROCRYPT 1999
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120-126 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 24
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.