메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2228-2236

Efficient anonymous message submission

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION ROUNDS; COMPUTATIONAL OVERHEADS; GROUP SIZE; HIGH PROBABILITY; MALICIOUS ATTACK; ONLINE SURVEYS; PRIVACY CONCERNS; SECRET SHARING SCHEMES; SYMMETRIC-KEY CRYPTOSYSTEM;

EID: 84861631303     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195608     Document Type: Conference Paper
Times cited : (16)

References (28)
  • 1
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • ACM
    • R. Agrawal and R. Srikant, "Privacy-preserving data mining," in SIGMOD, vol. 29, no. 2. ACM, 2000, pp. 439-450.
    • (2000) SIGMOD , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 2
    • 0031351741 scopus 로고    scopus 로고
    • A concrete security treatment of symmetric encryption
    • Published by the IEEE Computer Society
    • M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption," in focs. Published by the IEEE Computer Society, 1997, p. 394.
    • (1997) Focs , pp. 394
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 3
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret
    • (extended abstract), Springer
    • J. Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)," in Advances in Cryptology?CRYPTO?86. Springer, 1987, pp. 251-260.
    • (1987) Advances in Cryptology?CRYPTO?86 , pp. 251-260
    • Benaloh, J.1
  • 4
    • 36349034335 scopus 로고    scopus 로고
    • Towards optimal toom-cook multiplication for univariate and multivariate polynomials in characteristic 2 and 0
    • M. Bodrato, "Towards optimal toom-cook multiplication for univariate and multivariate polynomials in characteristic 2 and 0," Arithmetic of Finite Fields, pp. 116-133, 2007.
    • (2007) Arithmetic of Finite Fields , pp. 116-133
    • Bodrato, M.1
  • 6
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multikeyword ranked search over encrypted cloud data
    • IEEE
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multikeyword ranked search over encrypted cloud data," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 829-837.
    • (2011) INFOCOM, 2011 Proceedings IEEE , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 8
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," Journal of cryptology, vol. 1, no. 1, pp. 65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 9
    • 78650018339 scopus 로고    scopus 로고
    • Dissent: Accountable anonymous group messaging
    • ACM
    • H. Corrigan-Gibbs and B. Ford, "Dissent: accountable anonymous group messaging," in ACM CCS. ACM, 2010, pp. 340-350.
    • (2010) ACM CCS , pp. 340-350
    • Corrigan-Gibbs, H.1    Ford, B.2
  • 10
    • 84861626240 scopus 로고    scopus 로고
    • Crypto++, http://www.cryptopp.com/, 2010.
    • (2010) Crypto++
  • 11
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • ACM
    • W. Du and M. Atallah, "Secure multi-party computation problems and their applications: a review and open problems," in Proceedings of the 2001 workshop on New security paradigms. ACM, 2001, pp. 13-22.
    • (2001) Proceedings of the 2001 Workshop on New Security Paradigms , pp. 13-22
    • Du, W.1    Atallah, M.2
  • 16
    • 79960878565 scopus 로고    scopus 로고
    • Findu: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu, and W. Lou, "Findu: Privacy-preserving personal profile matching in mobile social networks," in Proc. of Infocom, 2011.
    • Proc. of Infocom, 2011
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4
  • 19
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • T. Nishide and K. Ohta, "Multiparty computation for interval, equality, and comparison without bit-decomposition protocol," Public Key Cryptography-PKC 2007, pp. 343-360, 2007.
    • Public Key Cryptography-PKC 2007 , vol.2007 , pp. 343-360
    • Nishide, T.1    Ohta, K.2
  • 20
    • 84861630620 scopus 로고    scopus 로고
    • ns 2
    • ns 2, http://www.isi.edu/nsnam/ns/.
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 26
    • 70849131456 scopus 로고    scopus 로고
    • Secure knn computation on encrypted databases
    • ACM
    • W. Wong, D. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in SIGMOD. ACM, 2009, pp. 139-152.
    • (2009) SIGMOD , pp. 139-152
    • Wong, W.1    Cheung, D.2    Kao, B.3    Mamoulis, N.4
  • 27
    • 32344451483 scopus 로고    scopus 로고
    • Anonymity-preserving data collection
    • ACM
    • Z. Yang, S. Zhong, and R. Wright, "Anonymity-preserving data collection,"in ACM SIGKDD. ACM, 2005, pp. 334-343.
    • (2005) ACM SIGKDD , pp. 334-343
    • Yang, Z.1    Zhong, S.2    Wright, R.3
  • 28
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE
    • A. Yao, "How to generate and exchange secrets," in FOCS. IEEE, 1986, pp. 162-167.
    • (1986) FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.