Private resource pairing

0Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Protection of information confidentiality can result in obstruction of legitimate access to necessary resources. This paper explores the problem of pairing resource requestors and providers such that neither must sacrifice privacy. While solutions to similar problems exist, these solutions are inadequate or inefficient in the context of private resource pairing. This work explores private resource-pairing solutions under two models of participant behavior: honest-but-curious behavior and potentially malicious behavior. Without compromising security, the foundation of these solutions demonstrates significant performance benefits over a popular solution to the similar private matching problem. © 2006 Springer-Verlag.

Cite

CITATION STYLE

APA

Calandrino, J. A., & Weaver, A. C. (2006). Private resource pairing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4258 LNCS, pp. 258–276). https://doi.org/10.1007/11957454_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free