Proceedings of the 29th Annual Computer Security Applications Conference 2013
DOI: 10.1145/2523649.2523668
|View full text |Cite
|
Sign up to set email alerts
|

Do I know you?

Abstract: The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. In numerous applications, users need to make trust and/or access control decisions involving other (possibly stranger) users, and one important factor is often the existence of common social relationships. This motivates the need for secure and privacy-preserving techniques allowing users to assess whether or not they have mutual friends.This paper introduces the C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Encrypted randomized Bloom filters (ERBF): The encrypted randomized Bloom filter is denoted as ERBF, where ERBF = {Enc(RBF [1]), Enc(RBF [2]), . .…”
Section: Preliminaries 221 Elgamal Encryption Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Encrypted randomized Bloom filters (ERBF): The encrypted randomized Bloom filter is denoted as ERBF, where ERBF = {Enc(RBF [1]), Enc(RBF [2]), . .…”
Section: Preliminaries 221 Elgamal Encryption Algorithmmentioning
confidence: 99%
“…Private Set Intersection (PSI) addresses the current need for a solution to compute the intersection of two or more datasets without disclosing information about the data of each party, except for the intersection itself. PSI has wide applications such as social discovery [1][2][3], document-like detection [4], joint learning in neural network models [5], suspect detection [6], privacy-preserving data mining [7], privacy-preserving retrieval systems [8], cloud-based applications [9], and so on. Many high-performance PSI protocols have been proposed recently [10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…In PSI, clients learn information about the intersection of two sets while (i) not learning anything about the server's non-intersecting elements, and (ii) not leaking any information about their own set to the server. PSI protocols in the literature focus on providing two possible outputs: the intersection (e.g., finding common network intrusions [49], or discovering contacts [19]); and the cardinality of the intersection (e.g., privately counting the number of common friends between two social media users [50], or performing genomic tests [4]). Works in this area opt for a variety of trade-offs between the computational capability and the amount of bandwidth required to run the protocol [11,34,37,54].…”
Section: Related Workmentioning
confidence: 99%