2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) 2018
DOI: 10.1109/mass.2018.00014
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…This can be solved using a PSI-CA (standing for Private Set Intersection CArdinality), which cannot be directly instantiated from classical PSI. Among the cryptographic building blocks that can be combined to develop a PSI-CA protocol, we can cite for instance homomorphic encryption, as seen in works like [7,19,14], oblivious transfer [11], using generic public key techniques described in [8,29], or even commutative encryption similar to the method outlined in [20]. In this latter approach, one party, P 1 , initiates the protocol by sending its own set of items X encrypted as Enc P K1 (X) to P 2 .…”
Section: Private Set Intersectionmentioning
confidence: 99%
“…This can be solved using a PSI-CA (standing for Private Set Intersection CArdinality), which cannot be directly instantiated from classical PSI. Among the cryptographic building blocks that can be combined to develop a PSI-CA protocol, we can cite for instance homomorphic encryption, as seen in works like [7,19,14], oblivious transfer [11], using generic public key techniques described in [8,29], or even commutative encryption similar to the method outlined in [20]. In this latter approach, one party, P 1 , initiates the protocol by sending its own set of items X encrypted as Enc P K1 (X) to P 2 .…”
Section: Private Set Intersectionmentioning
confidence: 99%
“…Recent research focus on developing security models that provide data confidentiality in V2X communications. For instance, Liu et al [3] designed a privacy-preserving ad conversion protocol for V2X-assisted proximity marketing that achieves input certification and output verifiability against malicious ad networks. Also, Ulybyshev et al [4] suggested a data exchange method for V2X communication systems, which provides data confidentiality and integrity.…”
Section: Introductionmentioning
confidence: 99%