메뉴 건너뛰기




Volumn 6477 LNCS, Issue , 2010, Pages 213-231

Linear-complexity private set intersection protocols secure in malicious model

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 78650834525     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17373-8_13     Document Type: Conference Paper
Times cited : (165)

References (24)
  • 1
    • 38049082907 scopus 로고    scopus 로고
    • Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 2
    • 69949124606 scopus 로고    scopus 로고
    • Randomizable Proofs and Delegatable Anonymous Credentials
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable Proofs and Delegatable Anonymous Credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108-125. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 108-125
    • Belenkiy, M.1    Camenisch, J.2    Chase, M.3    Kohlweiss, M.4    Lysyanskaya, A.5    Shacham, H.6
  • 3
    • 35048901123 scopus 로고    scopus 로고
    • Public key Encryption with Keyword Search
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM Journal of Computing 32(3), 586-615 (2003)
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 5
    • 20544449100 scopus 로고    scopus 로고
    • The one-more-RSA-inversion problems and the security of chaum's blind signature scheme
    • DOI 10.1007/s00145-002-0120-1
    • Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. Journal of Cryptology 16(3), 185-215 (2003) (Pubitemid 41201209)
    • (2003) Journal of Cryptology , vol.16 , Issue.3 , pp. 185-215
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 6
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Boyen, X., Waters, B.: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 290-307. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 7
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO (1983)
    • (1983) CRYPTO
    • Chaum, D.1
  • 8
    • 67049154037 scopus 로고    scopus 로고
    • Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196-214. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 196-214
    • Camenisch, J.1    Kohlweiss, M.2    Rial, A.3    Sheedy, C.4
  • 9
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 10
    • 70350400269 scopus 로고    scopus 로고
    • Private intersection of certified sets
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Camenisch, J., Zaverucha, G.: Private intersection of certified sets. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 108-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 108-127
    • Camenisch, J.1    Zaverucha, G.2
  • 11
    • 69949150672 scopus 로고    scopus 로고
    • Privacy-Preserving Policy-Based Information Transfer
    • Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies. Springer, Heidelberg
    • De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G.: Privacy-Preserving Policy-Based Information Transfer. In: Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies. LNCS, vol. 5672, pp. 164-183. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5672 , pp. 164-183
    • De Cristofaro, E.1    Jarecki, S.2    Kim, J.3    Tsudik, G.4
  • 12
    • 78650849621 scopus 로고    scopus 로고
    • Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
    • ePrint Archive
    • De Cristofaro, E., Kim, J., Tsudik, G.: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model, Cryptology ePrint Archive (2010), http://eprint.iacr.org/2010/469
    • (2010) Cryptology
    • De Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 13
    • 68949136946 scopus 로고    scopus 로고
    • Efficient Robust Private Set Intersection
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5536 , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 15
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 16
    • 84958615646 scopus 로고    scopus 로고
    • Statistical zero knowledge protocols to prove modular polynomial relations
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 16-30
    • Fujisaki, E.1    Okamoto, T.2
  • 18
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 19
    • 79955547393 scopus 로고    scopus 로고
    • Efficient Set Operations in the Presence of Malicious Adversaries
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 20
    • 70350656283 scopus 로고    scopus 로고
    • Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 21
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 22
    • 33750199090 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation
    • Naor, M., Pinkas, B.: Oblivious polynomial evaluation. SIAM Journal on Computing 35(5), 1254-1284 (2006)
    • (2006) SIAM Journal on Computing , vol.35 , Issue.5 , pp. 1254-1284
    • Naor, M.1    Pinkas, B.2
  • 23
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 24
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Yao, A.C.: Protocols for secure computations. In: FOCS, pp. 160-164 (1982)
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.