2017
DOI: 10.1016/j.csi.2016.08.004
|View full text |Cite
|
Sign up to set email alerts
|

A two-party privacy preserving set intersection protocol against malicious users in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Compared with the classical related protocols, our solution has the advantage of higher security and lower communication complexity. In addition, our proposed protocol can also be extended to some other complicated privacy-preserving computation problems, such as privacy-preserving database queries over cloud data [Cao, Wang, Li et al (2014); Shen, Li, Li et al (2017)], privacy-preserving set operations in cloud computing [Cao, Li, Dang et al (2017); Zhuo, Jia, Guo et al 2017], and privacy-preserving reversible data hiding over encrypted image [Cao, Du, Wei et al (2016)]. Furthermore, the method of the oracle operation applied in the presented protocols is general and can be employed to solve other similar privacy-preserving computation geometry problems, such as convex hull, polygon inclusion, etc.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Compared with the classical related protocols, our solution has the advantage of higher security and lower communication complexity. In addition, our proposed protocol can also be extended to some other complicated privacy-preserving computation problems, such as privacy-preserving database queries over cloud data [Cao, Wang, Li et al (2014); Shen, Li, Li et al (2017)], privacy-preserving set operations in cloud computing [Cao, Li, Dang et al (2017); Zhuo, Jia, Guo et al 2017], and privacy-preserving reversible data hiding over encrypted image [Cao, Du, Wei et al (2016)]. Furthermore, the method of the oracle operation applied in the presented protocols is general and can be employed to solve other similar privacy-preserving computation geometry problems, such as convex hull, polygon inclusion, etc.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Of course, these methods reach much further than only these examples: MPSI protocols can be used among several commercial companies to find the intersection of customer lists where each list, except the intersection, is protected. The list of common customers can be used to plan promotions for such customers [14]; MPSI can be used among the community of medical professionals to find out the patients of a hospital who has participated in the medical tests of different research labs [15]; MPSI can also be used in multi-party access control, where several coowners of a common content each specify a set of users who are permitted to access data. The ones in the intersection are allowed to access the content [16]; MPSI can be employed among several enterprises which have private audit logs of connections to their corporate networks and are interested in identifying similar activities in all networks [17].…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have given multiple approaches to address this issue. Some privacy-preserving protocols [39], [40] are proposed based on aggregate signature [14] or hash-based commitment [15] but auditing is not mentioned in these schemes. Huang et al [18] proposed privacy-preserving scheme using group signature and blockchain.…”
Section: Introductionmentioning
confidence: 99%