Comparing information without leaking it

被引:156
|
作者
Fagin, R
Naor, M
Winkler, P
机构
[1] IBM RES CORP, ALMADEN RES CTR, FDN COMP SCI GRP, SAN JOSE, CA 95120 USA
[2] WEIZMANN INST SCI, DEPT APPL MATH & COMP SCI, IL-76100 REHOVOT, ISRAEL
[3] AT&T BELL LABS, MATH SCI RES CTR, MURRAY HILL, NJ 07974 USA
关键词
D O I
10.1145/229459.229469
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
How can two people determine without revealing anything else to each other whether they possess the same information-in case they do not? There are surprisingly simple solutions.
引用
收藏
页码:77 / 85
页数:9
相关论文
共 50 条
  • [1] Secure Authentication from a Weak Key, without Leaking Information
    Bouman, Niek J.
    Fehr, Serge
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 246 - 265
  • [2] Speculative Privacy Tracking (SPT): Leaking Information From Speculative Execution Without Compromising Privacy
    Choudhary, Rutvik
    Yu, Jiyong
    Fletcher, Christopher W.
    Morrison, Adam
    [J]. PROCEEDINGS OF 54TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2021, 2021, : 607 - 622
  • [3] Secure Computation with Information Leaking to an Adversary
    Ajtai, Miklos
    [J]. STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 715 - 724
  • [4] Inside information - Leaking stern tubes
    Santos, P
    [J]. MER-MARINE ENGINEERS REVIEW, 2004, : 37 - 37
  • [5] Leaking Information Through Cache LRU States
    Xiong, Wenjie
    Szefer, Jakub
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2020), 2020, : 139 - 152
  • [6] Downstream Information Leaking and Information Sharing Between Partially Informed Retailers
    Wei-Shiun Chang
    Daniel A. Sanchez-Loor
    [J]. Journal of Industry, Competition and Trade, 2020, 20 : 733 - 760
  • [7] Downstream Information Leaking and Information Sharing Between Partially Informed Retailers
    Chang, Wei-Shiun
    Sanchez-Loor, Daniel A.
    [J]. JOURNAL OF INDUSTRY COMPETITION & TRADE, 2020, 20 (04): : 733 - 760
  • [8] Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata
    Lazar, David
    Zeldovich, Nickolai
    [J]. PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2016, : 571 - 586
  • [9] Security policy for information erasing and leaking in multithreaded codes
    Jiang, Li
    Chen, Jian
    Ping, Ling-Di
    Chen, Xiao-Ping
    [J]. Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2010, 44 (05): : 854 - 862
  • [10] Resilience to Leaking - Dynamic Systems Modeling of Information Security
    Hamacher, Kay
    [J]. PLOS ONE, 2012, 7 (12):