메뉴 건너뛰기




Volumn , Issue , 2013, Pages 272-286

Differential privacy by typing in security protocols

Author keywords

cryptographic protocols; differential privacy; type systems

Indexed keywords

ALGORITHMIC VARIANTS; CRYPTOGRAPHIC PROTOCOLS; DIFFERENTIAL PRIVACIES; DISTRIBUTED DATABASE; ENFORCEMENT MECHANISMS; MECHANIZED VERIFICATIONS; STATISTICAL INFORMATION; TYPE SYSTEMS;

EID: 84885007411     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2013.25     Document Type: Conference Paper
Times cited : (30)

References (52)
  • 1
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets, " in SP'08. IEEE, 2008, pp. 111-125.
    • (2008) SP'08. IEEE , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 2
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Springer
    • C. Dwork, "Differential Privacy, " in ICALP'06, ser. LNCS. Springer, 2006, pp. 1-12.
    • (2006) ICALP'06, Ser. LNCS , pp. 1-12
    • Dwork, C.1
  • 3
    • 78249264133 scopus 로고    scopus 로고
    • Distance Makes the Types Grow stronger: A Calculus for Differential Privacy
    • J. Reed and B. C. Pierce, "Distance Makes the Types Grow stronger: A Calculus for Differential Privacy, " in ICFP'10. ACM, 2010, pp. 157-168.
    • (2010) ICFP'10. ACM , pp. 157-168
    • Reed, J.1    Pierce, B.C.2
  • 5
    • 84857188426 scopus 로고    scopus 로고
    • Probabilistic relational reasoning for differential privacy
    • G. Barthe, B. Köpf, F. Olmedo, and S. Zanella Béguelin, "Probabilistic Relational Reasoning for Differential Privacy, " in POPL'12. ACM, 2012, pp. 97-110.
    • (2012) POPL'12. ACM , pp. 97-110
    • Barthe, G.1    Köpf, B.2    Olmedo, F.3    Zanella Béguelin, S.4
  • 7
    • 51849137365 scopus 로고    scopus 로고
    • Distributed private data analysis: Simultaneously solving how and what
    • Springer
    • A. Beimel, K. Nissim, and E. Omri, "Distributed Private Data Analysis: Simultaneously Solving How and What, " in CRYPTO'08. Springer, 2008, pp. 451-468.
    • (2008) CRYPTO'08 , pp. 451-468
    • Beimel, A.1    Nissim, K.2    Omri, E.3
  • 10
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption, " in SIGMOD/PODS'10. ACM, 2010, pp. 735-746.
    • (2010) SIGMOD/PODS'10. ACM , pp. 735-746
    • Rastogi, V.1    Nath, S.2
  • 11
    • 84885005178 scopus 로고    scopus 로고
    • Distributed private heavy hitters
    • abs/1202. 4910
    • J. Hsu, S. Khanna, and A. Roth, "Distributed Private Heavy Hitters, " CoRR, vol. abs/1202. 4910, 2012.
    • (2012) CoRR
    • Hsu, J.1    Khanna, S.2    Roth, A.3
  • 15
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Springer
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating Noise to Sensitivity in Private Data Analysis, " in TCC'06, ser. LNCS. Springer, 2006, pp. 265-284.
    • (2006) TCC'06, Ser. LNCS , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 16
    • 46749128577 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • F. McSherry and K. Talwar, "Mechanism Design via Differential Privacy, " in FOCS'07. IEEE, 2007, pp. 94-103.
    • (2007) FOCS'07. IEEE , pp. 94-103
    • McSherry, F.1    Talwar, K.2
  • 20
    • 0037432692 scopus 로고    scopus 로고
    • Secrecy types for asymmetric communication
    • Springer
    • M. Abadi and B. Blanchet, "Secrecy Types for Asymmetric Communication, " in FOSSACS'01, ser. LNCS, vol. 2030. Springer, 2001, pp. 25-41.
    • (2001) FOSSACS'01, Ser. LNCS , vol.2030 , pp. 25-41
    • Abadi, M.1    Blanchet, B.2
  • 21
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • B. Blanchet, "Automatic Proof of Strong Secrecy for Security Protocols, " in SP'04. IEEE, 2004, pp. 86-100.
    • (2004) SP'04. IEEE , pp. 86-100
    • Blanchet, B.1
  • 22
    • 80755169483 scopus 로고    scopus 로고
    • Modular code-based cryptographic verification
    • C. Fournet, M. Kohlweiss, and P.-Y. Strub, "Modular Code-Based Cryptographic Verification, " in CCS'11. ACM, 2011, pp. 341-350.
    • (2011) CCS'11. ACM , pp. 341-350
    • Fournet, C.1    Kohlweiss, M.2    Strub, P.-Y.3
  • 23
    • 85031939047 scopus 로고
    • M-structures: Extending a parallel, non-strict, functional language with state
    • Springer
    • P. S. Barth, R. S. Nikhil, and Arvind, "M-structures: Extending a parallel, non-strict, functional language with state, " in FPCA'91. Springer, 1991, pp. 538-568.
    • (1991) FPCA'91 , pp. 538-568
    • Barth, P.S.1    Nikhil, R.S.2    Arvind3
  • 24
    • 80052649937 scopus 로고    scopus 로고
    • Union and intersection types for secure protocol implementations
    • Springer
    • M. Backes, M. Maffei, and C. Hri̧tcu, "Union and Intersection Types for Secure Protocol Implementations, " in TOSCA'11, ser. LNCS. Springer, 2011, pp. 1-28.
    • (2011) TOSCA'11, Ser. LNCS , pp. 1-28
    • Backes, M.1    Maffei, M.2    Hri̧tcu, C.3
  • 25
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • F. McSherry, "Privacy Integrated Queries: an Extensible Platform for Privacy-Preserving Data Analysis, " in SIGMOD/PODS'09. ACM, 2009, pp. 19-30.
    • (2009) SIGMOD/PODS'09. ACM , pp. 19-30
    • McSherry, F.1
  • 26
    • 0001306213 scopus 로고    scopus 로고
    • Efficient resource management for linear logic proof search
    • I. Cervesato, J. S. Hodas, and F. Pfenning, "Efficient Resource Management for Linear Logic Proof Search, " TCS, vol. 232, no. 1-2, pp. 133-163, 2000.
    • (2000) TCS , vol.232 , Issue.1-2 , pp. 133-163
    • Cervesato, I.1    Hodas, J.S.2    Pfenning, F.3
  • 27
    • 0015561577 scopus 로고
    • Protection in programming languages
    • J. Morris, "Protection in Programming Languages, " CACM, vol. 16, no. 1, pp. 15-21, 1973.
    • (1973) CACM , vol.16 , Issue.1 , pp. 15-21
    • Morris, J.1
  • 28
    • 34047126463 scopus 로고    scopus 로고
    • A bisimulation for dynamic sealing
    • E. Sumii and B. Pierce, "A Bisimulation for Dynamic Sealing, " TCS, vol. 375, no. 1-3, pp. 169-192, 2007.
    • (2007) TCS , vol.375 , Issue.1-3 , pp. 169-192
    • Sumii, E.1    Pierce, B.2
  • 31
    • 84874428530 scopus 로고    scopus 로고
    • Logical foundations of secure resource management in protocol implementations
    • Springer
    • M. Bugliesi, S. Calzavara, F. Eigner, and M. Maffei, "Logical Foundations of Secure Resource Management in Protocol Implementations, " in POST'13. Springer, 2013, pp. 105-125.
    • (2013) POST'13 , pp. 105-125
    • Bugliesi, M.1    Calzavara, S.2    Eigner, F.3    Maffei, M.4
  • 32
    • 80054887187 scopus 로고    scopus 로고
    • Formal verification of differential privacy for interactive systems (extended abstract)
    • M. C. Tschantz, D. Kaynar, and A. Datta, "Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract), " ENTCS, vol. 276, pp. 61-79, 2011.
    • (2011) ENTCS , vol.276 , pp. 61-79
    • Tschantz, M.C.1    Kaynar, D.2    Datta, A.3
  • 38
    • 79953187235 scopus 로고    scopus 로고
    • Towards privacy for social networks: A zero-knowledge based definition of privacy
    • Springer
    • J. Gehrke, E. Lui, and R. Pass, "Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy, " in TCC'11. Springer, 2011, pp. 432-449.
    • (2011) TCC'11 , pp. 432-449
    • Gehrke, J.1    Lui, E.2    Pass, R.3
  • 39
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi, "Secrecy by Typing in Security Protocols, " JACM, vol. 46, no. 5, pp. 749-786, 1999.
    • (1999) JACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 41
    • 84885002098 scopus 로고    scopus 로고
    • Automated synthesis of privacy-preserving distributed applications
    • M. Backes, M. Maffei, and K. Pecina, "Automated Synthesis of Privacy-Preserving Distributed Applications, " in NDSS'12. ISOC, 2012.
    • (2012) NDSS'12. ISOC
    • Backes, M.1    Maffei, M.2    Pecina, K.3
  • 42
  • 43
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. Jeffrey, "Authenticity by Typing for Security Protocols, " JCS, vol. 11, no. 4, pp. 451-519, 2003.
    • (2003) JCS , vol.11 , Issue.4 , pp. 451-519
    • Gordon, A.D.1    Jeffrey, A.2
  • 44
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • -, "Types and Effects for Asymmetric Cryptographic Protocols, " JCS, vol. 12, no. 3, pp. 435-484, 2004.
    • (2004) JCS , vol.12 , Issue.3 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.2
  • 45
    • 34548820967 scopus 로고    scopus 로고
    • Dynamic types for authentication
    • M. Bugliesi, R. Focardi, and M. Maffei, "Dynamic Types for Authentication, " JCS, vol. 15, no. 6, pp. 563-617, 2007.
    • (2007) JCS , vol.15 , Issue.6 , pp. 563-617
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 46
    • 21144444143 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • Springer
    • -, "Compositional Analysis of Authentication Protocols, " in ESOP'04, ser. LNCS, vol. 2986. Springer, 2004, pp. 140-154.
    • (2004) ESOP'04, Ser. LNCS , vol.2986 , pp. 140-154
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 48
    • 28144464907 scopus 로고    scopus 로고
    • Analysis of typed-based analyses of authentication protocols
    • -, "Analysis of Typed-Based Analyses of Authentication Protocols, " in CSFW'05. IEEE, 2005, pp. 112-125.
    • (2005) CSFW'05. IEEE , pp. 112-125
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 49
    • 77950909049 scopus 로고    scopus 로고
    • Modular verification of security protocol code by typing
    • K. Bhargavan, C. Fournet, and A. D. Gordon, "Modular Verification of Security Protocol Code by Typing, " in POPL'10. ACM, 2010, pp. 445-456.
    • (2010) POPL'10. ACM , pp. 445-456
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 51
    • 80052669061 scopus 로고    scopus 로고
    • Resource-aware authorization policies in statically typed cryptographic protocols
    • M. Bugliesi, S. Calzavara, F. Eigner, and M. Maffei, "Resource-aware Authorization Policies in Statically Typed Cryptographic Protocols, " in CSF'11. IEEE, 2011, pp. 83-98.
    • (2011) CSF'11. IEEE , pp. 83-98
    • Bugliesi, M.1    Calzavara, S.2    Eigner, F.3    Maffei, M.4
  • 52
    • 77956247703 scopus 로고    scopus 로고
    • Type inference in intuitionistic linear logic
    • P. Baillot and M. Hofmann, "Type Inference in Intuitionistic Linear Logic, " in PPDP'10. ACM, 2010, pp. 219-230.
    • (2010) PPDP'10. ACM , pp. 219-230
    • Baillot, P.1    Hofmann, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.