메뉴 건너뛰기




Volumn , Issue , 2013, Pages 789-800

When private set intersection meets big data: An efficient and scalable protocol

Author keywords

bloom filters; private set intersection

Indexed keywords

BLOOM FILTERS; HIGH SCALABILITIES; LARGE-SCALE DATA PROCESSING; MODERN APPLICATIONS; ORDERS OF MAGNITUDE; PRIVACY-PRESERVING PROTOCOLS; SCALABLE PROTOCOLS; SET INTERSECTION;

EID: 84888990465     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516701     Document Type: Conference Paper
Times cited : (354)

References (40)
  • 1
    • 84889074923 scopus 로고    scopus 로고
    • Hadoop
    • Hadoop. http://hadoop.apache.org/.
  • 2
    • 84889063505 scopus 로고    scopus 로고
    • Murmurhash
    • Murmurhash. https://code.google.com/p/smhasher/.
  • 3
    • 84889055448 scopus 로고    scopus 로고
    • Opencl
    • Opencl. http://www.khronos.org/opencl/.
  • 7
    • 0029702967 scopus 로고    scopus 로고
    • Correlated pseudorandomness and the complexity of private computations
    • D. Beaver. Correlated pseudorandomness and the complexity of private computations. In STOC, pages 479-488, 1996.
    • (1996) STOC , pp. 479-488
    • Beaver, D.1
  • 9
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 13
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung. Efficient robust private set intersection. In ACNS, pages 125-142, 2009.
    • (2009) ACNS , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 15
    • 78650834525 scopus 로고    scopus 로고
    • Linear-complexity private set intersection protocols secure in malicious model
    • E. De Cristofaro, J. Kim, and G. Tsudik. Linear-complexity private set intersection protocols secure in malicious model. In ASIACRYPT, pages 213-231, 2010.
    • (2010) ASIACRYPT , pp. 213-231
    • De Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 16
    • 77955318017 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear complexity
    • E. De Cristofaro and G. Tsudik. Practical private set intersection protocols with linear complexity. In Financial Cryptography, pages 143-159, 2010.
    • (2010) Financial Cryptography , pp. 143-159
    • De Cristofaro, E.1    Tsudik, G.2
  • 17
    • 84863221426 scopus 로고    scopus 로고
    • Experimenting with fast private set intersection
    • E. De Cristofaro and G. Tsudik. Experimenting with fast private set intersection. In TRUST, pages 55-73, 2012.
    • (2012) TRUST , pp. 55-73
    • De Cristofaro, E.1    Tsudik, G.2
  • 18
    • 85030321143 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In OSDI, pages 137-150, 2004.
    • (2004) OSDI , pp. 137-150
    • Dean, J.1    Ghemawat, S.2
  • 20
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Commun. ACM, 28(6):637-647, 1985.
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 21
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In EUROCRYPT, pages 1-19, 2004.
    • (2004) EUROCRYPT , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 23
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In TCC, pages 155-175, 2008.
    • (2008) TCC , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 24
    • 79955547393 scopus 로고    scopus 로고
    • Efficient set operations in the presence of malicious adversaries
    • C. Hazay and K. Nissim. Efficient set operations in the presence of malicious adversaries. In Public Key Cryptography, pages 312-331, 2010.
    • (2010) Public Key Cryptography , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 25
    • 85168150014 scopus 로고    scopus 로고
    • Private set intersection: Are garbled circuits better than custom protocols?
    • Y. Huang, D. Evans, and J. Katz. Private set intersection: Are garbled circuits better than custom protocols? In NDSS, 2012.
    • (2012) NDSS
    • Huang, Y.1    Evans, D.2    Katz, J.3
  • 26
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In CRYPTO, pages 145-161, 2003.
    • (2003) CRYPTO , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 27
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
    • S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In TCC, pages 577-594, 2009.
    • (2009) TCC , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 28
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • S. Jarecki and X. Liu. Fast secure computation of set intersection. In SCN, pages 418-435, 2010.
    • (2010) SCN , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 29
    • 84871965745 scopus 로고    scopus 로고
    • Outsourced private set intersection using homomorphic encryption
    • F. Kerschbaum. Outsourced private set intersection using homomorphic encryption. In ASIACCS, pages 85-86, 2012.
    • (2012) ASIACCS , pp. 85-86
    • Kerschbaum, F.1
  • 30
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • L. Kissner and D. X. Song. Privacy-preserving set operations. In CRYPTO, pages 241-257, 2005.
    • (2005) CRYPTO , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 32
    • 71549134004 scopus 로고    scopus 로고
    • Privacy-preserving relationship path discovery in social networks
    • G. Mezzour, A. Perrig, V. D. Gligor, and P. Papadimitratos. Privacy-preserving relationship path discovery in social networks. In CANS, pages 189-208, 2009.
    • (2009) CANS , pp. 189-208
    • Mezzour, G.1    Perrig, A.2    Gligor, V.D.3    Papadimitratos, P.4
  • 34
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In SODA, pages 448-457, 2001.
    • (2001) SODA , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 37
    • 77957859235 scopus 로고    scopus 로고
    • Cardinality estimation and dynamic length adaptation for bloom filters
    • O. Papapetrou, W. Siberski, and W. Nejdl. Cardinality estimation and dynamic length adaptation for bloom filters. Distributed and Parallel Databases, 28(2-3):119-156, 2010.
    • (2010) Distributed and Parallel Databases , vol.28 , Issue.2-3 , pp. 119-156
    • Papapetrou, O.1    Siberski, W.2    Nejdl, W.3
  • 40
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.