메뉴 건너뛰기




Volumn 2, Issue 2, 2009, Pages 131-139

Cryptographically secure bloom-filters

Author keywords

[No Author keywords available]

Indexed keywords

BLIND SIGNATURES; PRIVACY PRESERVING; PSEUDO-RANDOM FUNCTIONS; SECURITY DEFINITIONS; TRACEBACK; WEB CACHE SHARING;

EID: 78651538727     PISSN: 18885063     EISSN: 20131631     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (37)

References (14)
  • 2
    • 25844497297 scopus 로고    scopus 로고
    • The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme
    • M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko, The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme, Financial Cryptography 2001, pp.309-328, 2001.
    • (2001) Financial Cryptography , vol.2001 , pp. 309-328
    • Bellare, M.1    Namprempre, C.2    Pointcheval, D.3    Semanko, M.4
  • 4
    • 0014814325 scopus 로고
    • Space/time Trade-offs inHash Coding with Allowable Errors
    • B.H. Bloom, Space/time Trade-offs inHash Coding with Allowable Errors, Communication of the ACM 13(7), pp.422-427, 1970.
    • (1970) Communication of The Acm , vol.13 , Issue.7 , pp. 422-427
    • Bloom, B.H.1
  • 5
    • 35248880074 scopus 로고    scopus 로고
    • Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie- Hellman-Group Signature Scheme
    • A. Boldyreva, Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie- Hellman-Group Signature Scheme, Public Key Cryptography 2003, pp.31-46, 2003.
    • (2003) Public Key Cryptography , vol.2003 , pp. 31-46
    • Boldyreva, A.1
  • 6
    • 70450232823 scopus 로고    scopus 로고
    • Network Applications of Bloom Filters: A Survey
    • A. Broder, M. Mitzenmacher, Network Applications of Bloom Filters: A Survey, Internet Math, Volume 1, Number 4 (2003), 485-509.
    • (2003) Internet Math , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 7
    • 38049132285 scopus 로고    scopus 로고
    • Simulatable Adaptive Oblivious Transfer
    • J. Camenisch, G. Neven, A. Shelat, Simulatable Adaptive Oblivious Transfer, EUROCRYPT 2007, pp.573-590, 2007.
    • (2007) Eurocrypt , vol.2007 , pp. 573-590
    • Camenisch, J.1    Neven, G.2    Shelat, A.3
  • 8
    • 0020915882 scopus 로고
    • Blind Signature for Untraceable Payments
    • D. Chaum, Blind Signature for Untraceable Payments, CRYPTO 1982, pp.199-203, 1983.
    • (1983) Crypto , vol.1982 , pp. 199-203
    • Chaum, D.1
  • 9
    • 24144488603 scopus 로고    scopus 로고
    • Keyword Search and Oblivious Pseudorandom Functions
    • M.J. Freedman, Y. Ishai, B. Pinkas, O. Reingold, Keyword Search and Oblivious Pseudorandom Functions, TCC 2005, pp.303-324, 2005.
    • (2005) Tcc , vol.2005 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 10
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • M.J. Freedman, K. Nissim, B. Pinkas, Efficient Private Matching and Set Intersection, EUROCRYPT 2004, pp.1-19, 2004.
    • (2004) Eurocrypt , vol.2004 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 12
    • 40249108370 scopus 로고    scopus 로고
    • Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    • C. Hazay, Y. Lindell, Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries, TCC 2008, pp.155-175, 2008.
    • (2008) Tcc , vol.2008 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 13
    • 33244488406 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, 216
    • E.J. Goh, Secure Indexes, Cryptology ePrint Archive, 2003/216.
    • (2003) Secure Indexes
    • Goh, E.J.1
  • 14
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious Keyword Search
    • W. Ogata, K. Kurosawa, Oblivious Keyword Search, J. Complexity 20(2-3), pp.356-371, 2004.
    • (2004) J. Complexity , vol.20 , Issue.2-3 , pp. 356-371
    • Ogata, W.1    Kurosawa, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.