Cryptographically Secure Bloom-Filters

被引:0
|
作者
Nojima, Ryo [1 ]
Kadobayashi, Youki [2 ]
机构
[1] Natl Inst Informat & Commun Technol NICT, 4-2-1 Nukuikitamachi, Koganei, Tokyo 1848795, Japan
[2] Nara Inst Sci Technol NAIST, Ikoma, Nara 6300192, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter has many applications such as hash-based IP-traceback systems and Web cache sharing. In some of those applications, equipping the Bloom-filter with the privacy-preserving mechanism is crucial for the deployment. In this paper, we propose a cryptographically secure privacy-preserving Bloom-filter protocol. We propose such two protocols based on blind signatures and oblivious pseudorandom functions, respectively. To show that the proposed protocols are secure, we provide a reasonable security definition and prove the security.
引用
收藏
页码:131 / 139
页数:9
相关论文
共 50 条
  • [41] Sliding Bloom Filters
    Naor, Moni
    Yogev, Eylon
    [J]. ALGORITHMS AND COMPUTATION, 2013, 8283 : 513 - 523
  • [42] Scalable Bloom Filters
    Almeida, Paulo Sergio
    Baquero, Carlos
    Preguica, Nuno
    Hutchison, David
    [J]. INFORMATION PROCESSING LETTERS, 2007, 101 (06) : 255 - 261
  • [43] Cryptographically secure random number generator with chaotic additional input
    Fatih Özkaynak
    [J]. Nonlinear Dynamics, 2014, 78 : 2015 - 2020
  • [44] Design and implementation of a novel cryptographically secure pseudorandom number generator
    Juan Di Mauro
    Eduardo Salazar
    Hugo D. Scolnik
    [J]. Journal of Cryptographic Engineering, 2022, 12 : 255 - 265
  • [45] A novel framework for the construction of cryptographically secure S-boxes
    Arshad, Razi
    Jalil, Mudassir
    Hussain, Muzamal
    Tounsi, Abdelouahed
    [J]. COMPUTERS AND CONCRETE, 2024, 34 (01): : 833 - 845
  • [46] A chaos-based approach to the design of cryptographically secure substitutions
    Amigó, JM
    Szczepanski, J
    Kocarev, L
    [J]. PHYSICS LETTERS A, 2005, 343 (1-3) : 55 - 60
  • [47] A Cryptographically Secure Scheme for Preserving Privacy in Association Rule Mining
    Mohsin, Hufsa
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 43 - 53
  • [48] Cryptographically secure random number generator with chaotic additional input
    Ozkaynak, Fatih
    [J]. NONLINEAR DYNAMICS, 2014, 78 (03) : 2015 - 2020
  • [49] Hybrid Cryptographically Secure Pseudo-Random Bit Generator
    Kumar, Mahesh K. M.
    Sunitha, N. R.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 296 - 301
  • [50] An efficient key exchange protocol for cryptographically secure CDMA systems
    Shepherd, SJ
    Barton, SK
    Kemp, AH
    [J]. PIMRC '97 - EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS: WAVES OF THE YEAR 2000+, TECHNICAL PROGRAM, PROCEEDINGS, VOLS 1-3, 1997, : 480 - 484