Full metadata record
DC FieldValueLanguage
dc.contributor.authorRen, Weien_US
dc.contributor.authorHuang, Shiyongen_US
dc.contributor.authorRen, Yien_US
dc.contributor.authorChoo, Kim-Kwang Raymonden_US
dc.date.accessioned2019-04-03T06:41:49Z-
dc.date.available2019-04-03T06:41:49Z-
dc.date.issued2016-06-21en_US
dc.identifier.issn1932-6203en_US
dc.identifier.urihttp://dx.doi.org/10.1371/journal.pone.0157752en_US
dc.identifier.urihttp://hdl.handle.net/11536/133923-
dc.description.abstractPrivacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack).en_US
dc.language.isoen_USen_US
dc.titleLiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computationen_US
dc.typeArticleen_US
dc.identifier.doi10.1371/journal.pone.0157752en_US
dc.identifier.journalPLOS ONEen_US
dc.citation.volume11en_US
dc.citation.issue6en_US
dc.citation.spage0en_US
dc.citation.epage0en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000378212400037en_US
dc.citation.woscount5en_US
Appears in Collections:Articles


Files in This Item:

  1. 733a0f9ad0b728184721979c5bf90e5a.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.