메뉴 건너뛰기




Volumn 6123 LNCS, Issue , 2010, Pages 420-437

Privacy-preserving group discovery with linear complexity

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED KEY EXCHANGE; COMMUNICATION COMPLEXITY; GENERIC SOLUTIONS; LINEAR COMPLEXITY; MULTI-GROUP; MULTIPLE INPUTS; PRIVACY PRESERVING; RESEARCH PROBLEMS; SECURE SESSION; SECURITY MODEL; SESSION KEY;

EID: 79956319602     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13708-2_25     Document Type: Conference Paper
Times cited : (25)

References (21)
  • 4
    • 70350400269 scopus 로고    scopus 로고
    • Private intersection of certified sets
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Camenisch, J., Zaverucha, G.M.: Private Intersection of Certified Sets. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 108-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 108-127
    • Camenisch, J.1    Zaverucha, G.M.2
  • 5
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
    • (2001) LNCS , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 7
    • 69949150672 scopus 로고    scopus 로고
    • Privacy-preserving policy-based information transfer
    • Goldberg, I., Atallah, M.J. (eds.) PETS 2009. Springer, Heidelberg
    • Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G.: Privacy-Preserving Policy-Based Information Transfer. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 164-184. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5672 , pp. 164-184
    • Cristofaro, E.1    Jarecki, S.2    Kim, J.3    Tsudik, G.4
  • 8
    • 84929333399 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear computational and bandwidth complexity
    • Cryptology ePrint Archive, Report 2009/491. To appear in Financial Cryptography and Data Security. Springer, Heidelberg
    • Cristofaro, E., Tsudik, G.: Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity. Cryptology ePrint Archive, Report 2009/491. To appear in Financial Cryptography and Data Security. LNCS, vol. 6052. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6052
    • Cristofaro, E.1    Tsudik, G.2
  • 9
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 10
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 11
    • 79955547393 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries
    • Cryptology ePrint Archive, Report 2009/594. Nguyen, P.Q., Pointcheval, D. (Eds.) PKC 2010. Springer, Heidelberg
    • Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. Cryptology ePrint Archive, Report 2009/594. In: Nguyen, P.Q., Pointcheval, D. (Eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 12
    • 84867284322 scopus 로고    scopus 로고
    • Group secret handshakes or affiliation-hiding authenticated group key agreement
    • Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
    • Jarecki, S., Kim, J., Tsudik, G.: Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 287-308. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4377 , pp. 287-308
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 14
    • 38049060325 scopus 로고    scopus 로고
    • Unlinkable secret handshakes and key-private group key management schemes
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 270-287. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 270-287
    • Jarecki, S.1    Liu, X.2
  • 15
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 16
    • 70350325165 scopus 로고    scopus 로고
    • Private mutual authentication and conditional oblivious transfer
    • Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Private Mutual Authentication and Conditional Oblivious Transfer. In: Halevi, S. (ed.) Advances in Cryptology - CRYPTO 2009. LNCS, vol. 5677, pp. 90-107. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 90-107
    • Jarecki, S.1    Liu, X.2
  • 18
    • 84958683395 scopus 로고    scopus 로고
    • Balls into bins - A simple and tight analysis
    • Rolim, J.D.P., Serna, M., Luby, M. (eds.) RANDOM 1998. Springer, Heidelberg
    • Raab, M., Steger, A.: Balls Into Bins - A Simple and Tight Analysis. In: Rolim, J.D.P., Serna, M., Luby, M. (eds.) RANDOM 1998. LNCS, vol. 1518, pp. 159-170. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1518 , pp. 159-170
    • Raab, M.1    Steger, A.2
  • 19
    • 49049098105 scopus 로고    scopus 로고
    • A flexible framework for secret handshakes
    • Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
    • Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295-315. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4258 , pp. 295-315
    • Tsudik, G.1    Xu, S.2
  • 21
    • 14844289583 scopus 로고    scopus 로고
    • k-anonymous secret handshakes with reusable credentials
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • Xu, S., Yung, M.: k-Anonymous Secret Handshakes with Reusable Credentials. In: 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 158-167. ACM, New York (2004) (Pubitemid 40347107)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 158-167
    • Xu, S.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.