메뉴 건너뛰기




Volumn 12, Issue 1, 2013, Pages 49-65

Private discovery of common social contacts

Author keywords

Common social contacts; Friend of friend detection; Privacy; Social clouds; Social PKI

Indexed keywords

DATA PRIVACY; SOCIAL ASPECTS;

EID: 84872604336     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-012-0183-4     Document Type: Article
Times cited : (14)

References (42)
  • 1
    • 79952501372 scopus 로고    scopus 로고
    • (If) size matters: Sizehiding private set intersection
    • In: D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi (eds.), vol. 6571 of Lecture Notes in Computer Science, Taormina, Italy, March 6-9. Springer, Germany, Berlin
    • Ateniese, G., De Cristofaro, E., Tsudik, G.: (If) size matters: Sizehiding private set intersection. In: D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi (eds.) PKC 2011: 14th International Workshop on Theory and Practice in Public Key Cryptography, vol. 6571 of Lecture Notes in Computer Science, pp. 156-173. Taormina, Italy, March 6-9. Springer, Germany, Berlin (2011)
    • (2011) PKC 2011: 14th International Workshop On Theory and Practice In Public Key Cryptography , pp. 156-173
    • Ateniese, G.1    de Cristofaro, E.2    Tsudik, G.3
  • 4
    • 74049164714 scopus 로고    scopus 로고
    • Common friends discovery with privacy and authenticity
    • IEEE Computer Society
    • Chiou, S.-Y., Chang, S.-Y., Sun, H.-M.: Common friends discovery with privacy and authenticity. In: IAS, pp. 337-340. IEEE Computer Society (2009)
    • (2009) IAS , pp. 337-340
    • Chiou, S.-Y.1    Chang, S.-Y.2    Sun, H.-M.3
  • 5
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), vol. 5536 of Lecture Notes in Computer Science, ParisRocquencourt, France, June 2-5. Springer, Germany, Berlin
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 09: 7th International Conference on Applied Cryptography and Network Security, vol. 5536 of Lecture Notes in Computer Science, pp. 125-142. ParisRocquencourt, France, June 2-5. Springer, Germany, Berlin (2009)
    • (2009) ACNS 09: 7th International Conference On Applied Cryptography and Network Security , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 7
    • 78650834525 scopus 로고    scopus 로고
    • Linear-complexity private set intersection protocols secure in malicious model
    • In: Abe, M. (ed.), vol. 6477 of Lecture Notes in Computer Science, pp. 213-231. Singapore, December 5-9. Springer, Germany, Berlin
    • De Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) Advances in Cryptology-ASIACRYPT, vol. 6477 of Lecture Notes in Computer Science, pp. 213-231. Singapore, December 5-9. Springer, Germany, Berlin (2010)
    • (2010) Advances In Cryptology-ASIACRYPT
    • de Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 8
    • 79959302160 scopus 로고    scopus 로고
    • Private discovery of common social contacts
    • In: Lopez, J., Tsudik, G. (eds.), vol. 6715 of Lecture Notesin Computer Science, pp. 147-165, Nerja, Spain, June 7-10. Springer, Germany, Berlin
    • De Cristofaro, E., Manulis, M., Poettering, B.: Private discovery of common social contacts. In: Lopez, J., Tsudik, G. (eds.) ACNS 11: 9th International Conference on Applied Cryptography and Network Security, vol. 6715 of Lecture Notesin Computer Science, pp. 147-165, Nerja, Spain, June 7-10. Springer, Germany, Berlin (2011)
    • (2011) ACNS 11: 9th International Conference On Applied Cryptography and Network Security
    • de Cristofaro, E.1    Manulis, M.2    Poettering, B.3
  • 9
    • 77955318017 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear complexity
    • In: Sion, R. (ed.), vol. 6052 of Lecture Notes in Computer Science, Tenerife, Canary Islands, Spain, January 25-28. Springer, Germany, Berlin
    • De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Sion, R. (ed.), FC 2010: 14th International Conference on Financial Cryptography and Data Security, vol. 6052 of Lecture Notes in Computer Science, pp. 143-159. Tenerife, Canary Islands, Spain, January 25-28. Springer, Germany, Berlin (2010)
    • (2010) FC 2010: 14th International Conference On Financial Cryptography and Data Security , pp. 143-159
    • de Cristofaro, E.1    Tsudik, G.2
  • 10
    • 69949150672 scopus 로고    scopus 로고
    • Privacypreserving policy-based information transfer
    • In: Goldberg, I., Atallah, M.J. (eds.), vol. 5672 of Lecture Notes in Computer Science, Springer, Berlin
    • De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G.: Privacypreserving policy-based information transfer. In: Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies, vol. 5672 of Lecture Notes in Computer Science, pp. 164-184. Springer, Berlin (2009)
    • (2009) Privacy Enhancing Technologies , pp. 164-184
    • de Cristofaro, E.1    Jarecki, S.2    Kim, J.3    Tsudik, G.4
  • 11
    • 36348952601 scopus 로고    scopus 로고
    • Relationship identification for social network discovery
    • AAAI Press
    • Diehl, C.P., Namata, G., Getoor, L.: Relationship identification for social network discovery. In: AAAI, pp. 546-552. AAAI Press (2007)
    • (2007) AAAI , pp. 546-552
    • Diehl, C.P.1    Namata, G.2    Getoor, L.3
  • 12
    • 0024665726 scopus 로고
    • Key distribution system based on identification information
    • Okamoto, E., Tanaka, K.: Key distribution system based on identification information. IEEE J. Sel. Areas Commun. 7(4), 481-485 (1989)
    • (1989) IEEE J. Sel. Areas Commun , vol.7 , Issue.4 , pp. 481-485
    • Okamoto, E.1    Tanaka, K.2
  • 14
    • 84872604662 scopus 로고    scopus 로고
    • Free Software Foundation. The GNU MP Bignum Library
    • Free Software Foundation. The GNU MP Bignum Library. http://gmplib.org/
  • 16
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • In: Cachin, C., Camenisch, J. (eds.), vol. 3027 of Lecture Notes in Computer Science, pp. 1-19. Interlaken, Switzerland, May 2-6. Springer, Germany, Berlin
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology-EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 1-19. Interlaken, Switzerland, May 2-6. Springer, Germany, Berlin (2004)
    • (2004) Advances In Cryptology-EUROCRYPT 2004
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 18
    • 79956318444 scopus 로고    scopus 로고
    • Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead
    • In: Zhou, J., Yung, M. (eds.), vol. 6123 of Lecture Notes in Computer Science, pp. 309-328, Beijing, China, June 22-25. Springer, Germany, Berlin
    • Gennaro, R., Krawczyk, H., Rabin, T.: Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead. In: Zhou, J., Yung, M. (eds.) ACNS 10: 8th International Conference on Applied Cryptography and Network Security, vol. 6123 of Lecture Notes in Computer Science, pp. 309-328, Beijing, China, June 22-25. Springer, Germany, Berlin (2010)
    • (2010) ACNS 10: 8th International Conference On Applied Cryptography and Network Security
    • Gennaro, R.1    Krawczyk, H.2    Rabin, T.3
  • 19
    • 84872603899 scopus 로고    scopus 로고
    • Google Inc
    • Google Inc. Google+. http://plus.google.com
    • Google+
  • 20
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • In: Canetti, R. (ed.), vol. 4948 of Lecture Notes in Computer Science, San Francisco, CA, USA, March 19-21. Springer, Germany, Berlin
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008: 5th Theory of Cryptography Conference, vol. 4948 of Lecture Notes in Computer Science, pp. 155-175. San Francisco, CA, USA, March 19-21. Springer, Germany, Berlin (2008)
    • (2008) TCC 2008: 5th Theory of Cryptography Conference , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 21
    • 79955547393 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries
    • In: Nguyen, P.Q., Pointcheval, D. (eds.), vol. 6056 of Lecture Notes in Computer Science, Paris, France, May 26-28. Springer, Germany, Berlin
    • Hazay, C., Nissim, K.: Efficient set operations in the presence of malicious adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010: 13th International Conference on Theory and Practice of Public Key Cryptography, vol. 6056 of Lecture Notes in Computer Science, pp. 312-331. Paris, France, May 26-28. Springer, Germany, Berlin (2010)
    • (2010) PKC 2010: 13th International Conference On Theory and Practice of Public Key Cryptography , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 23
    • 43149110632 scopus 로고    scopus 로고
    • Beyond secret handshakes: Affiliation-hiding authenticated key exchange
    • In: Tal M. (ed.), vol. 4964 of Lecture Notes in Computer Science, San Francisco, CA, USA, April 7-11. Springer, Germany, Berlin
    • Jarecki, S., Kim, J., Tsudik, G.: Beyond secret handshakes: Affiliation-hiding authenticated key exchange. In: Tal M. (ed.), Topics in Cryptology-CT-RSA 2008, vol. 4964 of Lecture Notes in Computer Science, pp. 352-369. San Francisco, CA, USA, April 7-11. Springer, Germany, Berlin (2008)
    • (2008) Topics In Cryptology-CT-RSA 2008 , pp. 352-369
    • Jarecki, S.1    Kim, J.2    Tsudik, G.3
  • 24
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
    • In: Reingold, O. (ed.), vol. 5444 of Lecture Notes in Computer Science, Springer, Berlin, Germany, March
    • Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: Reingold, O. (ed.) TCC 2009: 6th Theory of Cryptography Conference, vol. 5444 of Lecture Notes in Computer Science, pp. 577-594. Springer, Berlin, Germany, March 15-17, 2009
    • (2009) TCC 2009: 6th Theory of Cryptography Conference , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 25
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • In: Garay, J.A., De Prisco, R. (eds.), vol. 6280 of Lecture Notes in Computer Science, Amalfi, Italy, September 13-15. Springer, Germany, Berlin
    • Jarecki, S., Liu, X.: Fast secure computation of set intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 10: 7th International Conference on Security in Communication Networks, vol. 6280 of Lecture Notes in Computer Science, pp. 418-435. Amalfi, Italy, September 13-15. Springer, Germany, Berlin (2010)
    • (2010) SCN 10: 7th International Conference On Security In Communication Networks , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 26
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • In: Shoup, V. (ed.), vol. 3621 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 14-18. Springer, Germany, Berlin
    • Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) Advances in Cryptology-CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 241-257, Santa Barbara, CA, USA, August 14-18. Springer, Germany, Berlin (2005)
    • (2005) Advances In Cryptology-CRYPTO 2005 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 27
    • 52649105864 scopus 로고    scopus 로고
    • Link privacy in social networks
    • IEEE
    • Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: ICDE, pp. 1355-1357. IEEE (2008)
    • (2008) ICDE , pp. 1355-1357
    • Korolova, A.1    Motwani, R.2    Nabar, S.U.3    Xu, Y.4
  • 28
    • 70349248583 scopus 로고    scopus 로고
    • Link privacy in social networks
    • Shanahan, J.G., Amer-Yahia, S., Manolescu, I., Zhang, Y., Evans, D.A., Kolcz, A., Choi, K.-S., Chowdhury, A. (eds.), ACM
    • Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Shanahan, J.G., Amer-Yahia, S., Manolescu, I., Zhang, Y., Evans, D.A., Kolcz, A., Choi, K.-S., Chowdhury, A. (eds.) CIKM, pp. 289-298. ACM (2008)
    • (2008) CIKM , pp. 289-298
    • Korolova, A.1    Motwani, R.2    Nabar, S.U.3    Xu, Y.4
  • 29
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols
    • In: Boneh, D. (ed.), vol. 2729 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 17-21. Springer. Germany, Berlin
    • Krawczyk, H.: SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.), Advances in Cryptology-CRYPTO 2003, vol. 2729 of Lecture Notes in Computer Science, pp. 400-425, Santa Barbara, CA, USA, August 17-21. Springer. Germany, Berlin (2003)
    • (2003) Advances In Cryptology-CRYPTO 2003 , pp. 400-425
    • Krawczyk, H.1
  • 30
    • 84872612366 scopus 로고    scopus 로고
    • LinkedIn. Press center about us, July 2012
    • LinkedIn. Press center about us. http://press.linkedin.com/about, July 2012
  • 31
    • 79956319602 scopus 로고    scopus 로고
    • Privacy-preserving group discovery with linear complexity
    • In: Zhou, J., Yung, M. (eds.), vol. 6123 of Lecture Notes in Computer Science, Beijing, China, June 22-25. Springer, Germany, Berlin
    • Manulis, M., Pinkas, B., Poettering, B.: Privacy-preserving group discovery with linear complexity. In: Zhou, J., Yung, M. (eds.) ACNS 10: 8th International Conference on Applied Cryptography and Network Security, vol. 6123 of Lecture Notes in Computer Science, pp. 420-437, Beijing, China, June 22-25. Springer, Germany, Berlin (2010)
    • (2010) ACNS 10: 8th International Conference On Applied Cryptography and Network Security , pp. 420-437
    • Manulis, M.1    Pinkas, B.2    Poettering, B.3
  • 32
    • 77955440831 scopus 로고    scopus 로고
    • Taming big brother ambitions: More privacy for secret handshakes
    • Atallah, M.J., Hopper, N.J. (eds), vol. 6205 of Lecture Notes in Computer Science, Springer
    • Manulis, M., Poettering, B., Tsudik, G.: Taming big brother ambitions: More privacy for secret handshakes. In Atallah, M.J., Hopper, N.J. (eds) Privacy Enhancing Technologies, vol. 6205 of Lecture Notes in Computer Science, pp. 149-165. Springer (2010)
    • (2010) Privacy Enhancing Technologies , pp. 149-165
    • Manulis, M.1    Poettering, B.2    Tsudik, G.3
  • 33
    • 79956049882 scopus 로고    scopus 로고
    • Practical affiliation-hiding authentication from improved polynomial interpolation
    • Manulis, M., Poettering, B.: Practical affiliation-hiding authentication from improved polynomial interpolation. In: ASIACCS, pp. 286-295 (2011)
    • (2011) ASIACCS , pp. 286-295
    • Manulis, M.1    Poettering, B.2
  • 35
    • 17444362761 scopus 로고    scopus 로고
    • On the security of modular exponentiation with application to the construction of pseudorandom generators
    • Goldreich, O., Rosen, V.: On the security of modular exponentiation with application to the construction of pseudorandom generators. J. Cryptol. 16(2), 71-93 (2003)
    • (2003) J. Cryptol , vol.16 , Issue.2 , pp. 71-93
    • Goldreich, O.1    Rosen, V.2
  • 36
    • 84964242030 scopus 로고
    • Key distribution systems based on identification information
    • In: Pomerance, C. (ed.), vol. 293 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 16-20. Springer, Germany, Berlin
    • Okamoto, E.: Key distribution systems based on identification information. In: Pomerance, C. (ed.) Advances in CryptologyCRYPTO'87, vol. 293 of Lecture Notes in Computer Science, pp. 194-202, Santa Barbara, CA, USA, August 16-20. Springer, Germany, Berlin (1988)
    • (1988) Advances In CryptologyCRYPTO'87 , pp. 194-202
    • Okamoto, E.1
  • 37
    • 38849162343 scopus 로고    scopus 로고
    • Computing communities in large networks using random walks
    • Pons, P., Latapy, M.: Computing communities in large networks using random walks. J. Graph Algorithms Appl. 10(2), 191-218 (2006)
    • (2006) J. Graph Algorithms Appl , vol.10 , Issue.2 , pp. 191-218
    • Pons, P.1    Latapy, M.2
  • 39
    • 56749173469 scopus 로고    scopus 로고
    • Veneta: Serverless friend-of-friend detection in mobile social networking
    • IEEE
    • von Arb, M., Bader, M., Kuhn, M., Wattenhofer, R.: Veneta: Serverless friend-of-friend detection in mobile social networking. In: WiMob, pp. 184-189. IEEE (2008)
    • (2008) WiMob , pp. 184-189
    • von Arb, M.1    Bader, M.2    Kuhn, M.3    Wattenhofer, R.4
  • 40
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • IEEE Computer Society
    • Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE Computer Society (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1
  • 42
    • 79960914914 scopus 로고    scopus 로고
    • Using friendship ties and family circles for link prediction
    • Giles, C.L., Smith, M., Yen, J., Zhang, H. (eds.), vol. 5498 of Lecture Notes in Computer Science, Springer
    • Zhelevam, E., Getoor, L., Golbeck, J., Kuter, U.: Using friendship ties and family circles for link prediction. In: Giles, C.L., Smith, M., Yen, J., Zhang, H. (eds.) SNAKDD, vol. 5498 of Lecture Notes in Computer Science, pp. 97-113. Springer (2008)
    • (2008) SNAKDD , pp. 97-113
    • Zhelevam, E.1    Getoor, L.2    Golbeck, J.3    Kuter, U.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.