Design and analysis of privacy-preserving protocols

作者: Russell Craig Paulet

DOI:

关键词:

摘要: More and more of our daily activities are using the Internet to provide an easy way to get access instant information. The equipment enabling these interactions is also storing information such as: time, where you are, what plan do. The ability store this information very convenient but also the source a major concern: once data stored, it must be protected. If was left unprotected, then people would feel reluctant use service. The aim thesis remove the need such data, while still maintaining overall utility, by designing analysing privacy preserving protocols.

参考文章(101)
Ronald L Rivest, Len Adleman, Michael L Dertouzos, ON DATA BANKS AND PRIVACY HOMOMORPHISMS ,(1978)
Josh Benaloh, Dense Probabilistic Encryption ,(1999)
Manoj M Prabhakaran, A. Sahai, None, Secure Multi-Party Computation ,(2013)
Mihir Bellare, Oded Goldreich, On Defining Proofs of Knowledge international cryptology conference. pp. 390- 420 ,(1992) , 10.1007/3-540-48071-4_28
Lars Kulik, Tanzima Hashem, Safeguarding location privacy in wireless ad-hoc networks ubiquitous computing. pp. 372- 390 ,(2007) , 10.5555/1771592.1771614
Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi, Fully homomorphic encryption over the integers with shorter public keys international cryptology conference. ,vol. 2011, pp. 487- 504 ,(2011) , 10.1007/978-3-642-22792-9_28
Moni Naor, Benny Pinkas, Oblivious Transfer with Adaptive Queries international cryptology conference. pp. 573- 590 ,(1999) , 10.1007/3-540-48405-1_36
Ramakrishnan Srikant, Rakesh Agrawal, Fast Algorithms for Mining Association Rules in Large Databases very large data bases. pp. 487- 499 ,(1994)
Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti, Time warp: how time affects privacy in LBSs international conference on information and communication security. ,vol. 6476, pp. 325- 339 ,(2010) , 10.1007/978-3-642-17650-0_23
Yehuda Lindell, Benny Pinkas, Privacy Preserving Data Mining international cryptology conference. pp. 36- 54 ,(2000) , 10.1007/3-540-44598-6_3