Cryptographically Secure Bloom-Filters

被引:0
|
作者
Nojima, Ryo [1 ]
Kadobayashi, Youki [2 ]
机构
[1] Natl Inst Informat & Commun Technol NICT, 4-2-1 Nukuikitamachi, Koganei, Tokyo 1848795, Japan
[2] Nara Inst Sci Technol NAIST, Ikoma, Nara 6300192, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter has many applications such as hash-based IP-traceback systems and Web cache sharing. In some of those applications, equipping the Bloom-filter with the privacy-preserving mechanism is crucial for the deployment. In this paper, we propose a cryptographically secure privacy-preserving Bloom-filter protocol. We propose such two protocols based on blind signatures and oblivious pseudorandom functions, respectively. To show that the proposed protocols are secure, we provide a reasonable security definition and prove the security.
引用
收藏
页码:131 / 139
页数:9
相关论文
共 50 条
  • [1] Enhancing the Security of Bloom-Filters with Blind Signatures
    Nojima, Ryo
    Tamura, Jin
    Kadobayashi, Youki
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 1019 - +
  • [2] Fluid Co-processing: GPU Bloom-filters for CPU Joins
    Gubner, Tim
    Tome, Diego
    Lang, Harald
    Boncz, Peter
    [J]. 15TH INTERNATIONAL WORKSHOP ON DATA MANAGEMENT ON NEW HARDWARE (DAMON 2019), 2019,
  • [3] Composite Bloom Filters for Secure Record Linkage
    Durham, Elizabeth A.
    Kantarcioglu, Murat
    Xue, Yuan
    Toth, Csaba
    Kuzu, Mehmet
    Malin, Bradley
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (12) : 2956 - 2968
  • [4] 一种基于bloom-filters的半连接查询优化算法
    孙中利
    戴玉刚
    刘战东
    [J]. 电子设计工程, 2011, (04) : 1 - 3
  • [5] Cryptographically Secure Computation
    Shen, Emily
    Varia, Mayank
    Cunningham, Robert K.
    Vesey, W. Konrad
    [J]. COMPUTER, 2015, 48 (04) : 78 - 81
  • [6] Cryptographically Secure Biometrics
    Stoianov, A.
    [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION VII, 2010, 7667
  • [7] Cryptographically Secure Shields
    Cioranesco, Jean-Michel
    Danger, Jean-Luc
    Graba, Tarik
    Guilley, Sylvain
    Mathieu, Yves
    Naccache, David
    Xuan Thuy Ngo
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 25 - 31
  • [8] Cryptographically secure identity certificates
    Kirovski, D
    Jojic, N
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 413 - 416
  • [9] Secure Sharing of Private Locations through Homomorphic Bloom Filters
    Feng, Yunhe
    Lu, Zheng
    Cao, Qing
    [J]. 2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 107 - 113
  • [10] Cryptographically Secure Detection of Injection Attacks
    Lu, Yun
    Mitropoulos, Konstantinos
    Ostrovsky, Rafail
    Weinstock, Avraham
    Zikas, Vassilis
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2240 - 2242