메뉴 건너뛰기




Volumn 6715 LNCS, Issue , 2011, Pages 147-165

Private discovery of common social contacts

Author keywords

[No Author keywords available]

Indexed keywords

COMMON PROBLEMS; COMMUNICATION OVERHEADS; COMPUTING DEVICES; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC TECHNIQUES; EXPERIMENTAL ANALYSIS; PRIVACY CONCERNS; PROVABLY SECURE; RANDOM ORACLE MODEL; RSA ASSUMPTION; SECRET HANDSHAKE; SET INTERSECTION; SOCIAL INTERACTIONS; SOCIAL PROXIMITY; SOCIAL RELATIONSHIPS; USER AUTHENTICATION;

EID: 79959302160     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21554-4_9     Document Type: Conference Paper
Times cited : (11)

References (44)
  • 2
    • 79952501372 scopus 로고    scopus 로고
    • (If) Size Matters: Size-hiding private set intersection
    • PKC Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Springer, Heidelberg
    • PKC. Ateniese, G., De Cristofaro, E., Tsudik, G.: (If) Size Matters: Size-Hiding Private Set Intersection. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC. 2011. LNCS, vol. 6571, pp. 156-173. Springer, Heidelberg (2011).
    • (2011) PKC. 2011. LNCS , vol.6571 , pp. 156-173
    • Ateniese, G.1    De Cristofaro, E.2    Tsudik, G.3
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: A Paradigm for designing efficient protocols
    • Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM CCS, pp. 62-73 (1993).
    • (1993) ACM CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires' problem
    • DOI 10.1016/S0166-218X(00)00342-5, PII S0166218X00003425
    • Boudot, F., Schoenmakers, B., Traoŕe, J.: A Fair and Efficient Solution to the Socialist Millionaires' Problem. Discrete Applied Mathematics 111(1-2), 23-36 (2001). (Pubitemid 33676119)
    • (2001) Discrete Applied Mathematics , vol.111 , Issue.1-2 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traore, J.3
  • 8
    • 77956987281 scopus 로고    scopus 로고
    • Credential authenticated identification and key exchange
    • Rabin, T. (ed.) Springer, Heidelberg
    • Camenisch, J., Casati, N., Groß, T., Shoup, V.: Credential Authenticated Identification and Key Exchange. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 255-276. Springer, Heidelberg (2010).
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 255-276
    • Camenisch, J.1    Casati, N.2    Groß, T.3    Shoup, V.4
  • 9
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001). (Pubitemid 33275827)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 70350400269 scopus 로고    scopus 로고
    • Private intersection of certified sets
    • Dingledine, R., Golle, P. (eds.) Springer, Heidelberg
    • Camenisch, J., Zaverucha, G.M.: Private intersection of certified sets. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 108-127. Springer, Heidelberg (2009).
    • (2009) FC 2009. LNCS , vol.5628 , pp. 108-127
    • Camenisch, J.1    Zaverucha, G.M.2
  • 12
    • 74049164714 scopus 로고    scopus 로고
    • Common friends discovery with privacy and authenticity
    • Chiou, S., Chang, S., Sun, H.: Common Friends Discovery with Privacy and Authenticity. In: IAS, pp. 337-340 (2009).
    • (2009) IAS , pp. 337-340
    • Chiou, S.1    Chang, S.2    Sun, H.3
  • 13
    • 68949136946 scopus 로고    scopus 로고
    • Efficient Robust Private Set Intersection
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) Springer, Heidelberg
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009).
    • (2009) ACNS 2009. LNCS , vol.5536 , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 14
    • 78650834525 scopus 로고    scopus 로고
    • Linear-complexity private set intersection protocols secure in malicious model
    • Abe, M. (ed.) Springer, Heidelberg
    • De Cristofaro, E., Kim, J., Tsudik, G.: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213-231. Springer, Heidelberg (2010).
    • (2010) ASIACRYPT 2010. LNCS , vol.6477 , pp. 213-231
    • De Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 15
    • 77955318017 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear complexity
    • Sion, R. (ed.) Springer, Heidelberg
    • De Cristofaro, E., Tsudik, G.: Practical Private Set Intersection Protocols with Linear Complexity. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 143-159. Springer, Heidelberg (2010).
    • (2010) FC 2010. LNCS , vol.6052 , pp. 143-159
    • De Cristofaro, E.1    Tsudik, G.2
  • 16
    • 84957695516 scopus 로고
    • Securing traceability of ciphertexts - Towards a secure software key escrow System
    • Guillou, L.C., Quisquater, J.-J. (eds.) Springer, Heidelberg
    • Desmedt, Y.: Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 147-157. Springer, Heidelberg (1995).
    • (1995) EUROCRYPT 1995. LNCS , vol.921 , pp. 147-157
    • Desmedt, Y.1
  • 17
    • 36348952601 scopus 로고    scopus 로고
    • Relationship identification for social network discovery
    • AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
    • Diehl, C., Namata, G., Getoor, L.: Relationship Identification for Social Network Discovery. AAAI 22(1), 546-552 (2007). (Pubitemid 350149627)
    • (2007) Proceedings of the National Conference on Artificial Intelligence , vol.1 , pp. 546-552
    • Diehl, C.P.1    Namata, G.2    Getoor, L.3
  • 18
    • 84877698512 scopus 로고    scopus 로고
    • Free Software Foundation
    • Free Software Foundation. The GNU MP Bignum Library, http://gmplib.org/.
    • The GNU MP Bignum Library
  • 19
    • 70349798920 scopus 로고    scopus 로고
    • Efficient private techniques for verifying social proximity
    • Freedman, M.J., Nicolosi, A.: Efficient Private Techniques for Verifying Social Proximity. In: IPTPS (2007).
    • (2007) IPTPS
    • Freedman, M.J.1    Nicolosi, A.2
  • 20
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004).
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 22
    • 79959316417 scopus 로고    scopus 로고
    • Cryptographic treatment of private user profiles
    • Springer, Heidelberg
    • G̈unther, F., Manulis, M., Strufe, T.: Cryptographic Treatment of Private User Profiles. In: Financial Cryptography Workshops. Springer, Heidelberg (2011), http://eprint.iacr.org/2011/064.
    • (2011) Financial Cryptography Workshops
    • G̈unther, F.1    Manulis, M.2    Strufe, T.3
  • 23
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.) Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC. 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008).
    • (2008) TCC. 2008. LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 24
    • 79955547393 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries
    • Nguyen, P.Q., Pointcheval, D. (eds.) Springer, Heidelberg
    • Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010).
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 27
    • 49049101312 scopus 로고    scopus 로고
    • Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials
    • Aceto, L., Damgard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A.,Walukiewicz, I. (eds.) Springer, Heidelberg
    • Jarecki, S., Liu, X.: Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. In: Aceto, L., Damgard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A.,Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 715-726. Springer, Heidelberg (2008).
    • (2008) ICALP 2008, Part II. LNCS , vol.5126 , pp. 715-726
    • Jarecki, S.1    Liu, X.2
  • 28
    • 70350325165 scopus 로고    scopus 로고
    • Private mutual authentication and conditional oblivious transfer
    • Halevi, S. (ed.) Springer, Heidelberg
    • Jarecki, S., Liu, X.: Private Mutual Authentication and Conditional Oblivious Transfer. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 90-107. Springer, Heidelberg (2009).
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 90-107
    • Jarecki, S.1    Liu, X.2
  • 29
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • Garay, J.A., De Prisco, R. (eds.) Springer, Heidelberg
    • Jarecki, S., Liu, X.: Fast Secure Computation of Set Intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418-435. Springer, Heidelberg (2010).
    • (2010) CN 2010. LNCS , vol.6280 , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 31
    • 70349248583 scopus 로고    scopus 로고
    • Link privacy in social networks
    • Korolova, A., Motwani, R., Nabar, S., Xu, Y.: Link Privacy in Social Networks. In: CIKM, pp. 289-298 (2008).
    • (2008) CIKM , pp. 289-298
    • Korolova, A.1    Motwani, R.2    Nabar, S.3    Xu, Y.4
  • 32
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Naor, M. (ed.) Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007).
    • (2007) EUROCRYPT 2007. LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 33
    • 79956319602 scopus 로고    scopus 로고
    • Privacy-preserving group discovery with linear complexity
    • Zhou, J., Yung, M. (eds.) Springer, Heidelberg
    • Manulis, M., Pinkas, B., Poettering, B.: Privacy-Preserving Group Discovery with Linear Complexity. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 420-437. Springer, Heidelberg (2010).
    • (2010) ACNS 2010. LNCS , vol.6123 , pp. 420-437
    • Manulis, M.1    Pinkas, B.2    Poettering, B.3
  • 35
    • 79956319822 scopus 로고    scopus 로고
    • Affiliation-hiding key exchange with untrusted group authorities
    • Zhou, J., Yung, M. (eds.) Springer, Heidelberg
    • Manulis, M., Poettering, B., Tsudik, G.: Affiliation-Hiding Key Exchange with Untrusted Group Authorities. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 402-419. Springer, Heidelberg (2010).
    • (2010) ACNS 2010. LNCS , vol.6123 , pp. 402-419
    • Manulis, M.1    Poettering, B.2    Tsudik, G.3
  • 36
    • 77955440831 scopus 로고    scopus 로고
    • Taming big brother ambitions: More privacy for secret handshakes
    • Atallah, M.J., Hopper, N.J. (eds.) Springer, Heidelberg
    • Manulis, M., Poettering, B., Tsudik, G.: Taming Big Brother Ambitions: More Privacy for Secret Handshakes. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 149-165. Springer, Heidelberg (2010).
    • (2010) PETS 2010. LNCS , vol.6205 , pp. 149-165
    • Manulis, M.1    Poettering, B.2    Tsudik, G.3
  • 37
    • 84964242030 scopus 로고
    • Key distribution systems based on identification information
    • Pomerance, C. (ed.) Springer, Heidelberg
    • Okamoto, E.: Key Distribution Systems Based on Identification Information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194-202. Springer, Heidelberg (1988).
    • (1988) CRYPTO 1987. LNCS , vol.293 , pp. 194-202
    • Okamoto, E.1
  • 38
    • 33646530046 scopus 로고    scopus 로고
    • Computing communities in large networks using random walks
    • Yolum, p. G̈ung̈or, T., G̈urgen, F., ̈Ozturan, C. (eds.) Springer, Heidelberg
    • Pons, P., Latapy, M.: Computing Communities in Large Networks Using Random Walks. In: Yolum, p., G̈ung̈or, T., G̈urgen, F., ̈Ozturan, C. (eds.) ISCIS 2005. LNCS, vol. 3733, pp. 284-293. Springer, Heidelberg (2005).
    • (2005) ISCIS 2005. LNCS , vol.3733 , pp. 284-293
    • Pons, P.1    Latapy, M.2
  • 39
    • 79959301236 scopus 로고    scopus 로고
    • The Facebook
    • The Facebook, Inc. Facebook's statistics (2010), http://www.facebook.com/ press/info.php?statistics.
    • (2010) Inc. Facebook's Statistics
  • 40
    • 56749173469 scopus 로고    scopus 로고
    • Veneta: Serverless friend-of- friend detection in mobile social networking
    • Von Arb, M., Bader, M., Kuhn, M., Wattenhofer, R.: Veneta: Serverless Friend-of- Friend Detection in Mobile Social Networking. In: WiMob, pp. 184-189 (2008).
    • (2008) WiMob , pp. 184-189
    • Von Arb, M.1    Bader, M.2    Kuhn, M.3    Wattenhofer, R.4
  • 42
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • Yao, A.: How to Generate and Exchange Secrets. In: 27th FOCS, pp. 162-167 (1986).
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.1
  • 44
    • 78650110617 scopus 로고    scopus 로고
    • Using friendship ties and family circles for link prediction
    • Zheleva, E., Getoor, L., Golbeck, J., Kuter, U.: Using Friendship Ties and Family Circles for Link Prediction. In: SNA-KDD, pp. 97-113 (2008)
    • (2008) SNA-KDD , pp. 97-113
    • Zheleva, E.1    Getoor, L.2    Golbeck, J.3    Kuter, U.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.