Public-key encrypted bloom filters with applications to supply chain integrity

7Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Bloom filters provide a space- and time-efficient mean to check the inclusion of an element in a set. In some applications it is beneficial, if the set represented by the Bloom filter is only revealed to authorized parties. Particularly, operations data in supply chain management can be very sensitive and Bloom filters can be applied to supply chain integrity validation. Despite the protection of the represented set, Bloom filter operations, such as the verification of set inclusion, need to be still feasible. In this paper we present privacy-preserving, publicly verifiable Bloom filters which offer both: privacy for the represented set and public Bloom filter operations. We give security proofs in the standard model. © 2011 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Kerschbaum, F. (2011). Public-key encrypted bloom filters with applications to supply chain integrity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6818 LNCS, pp. 60–75). https://doi.org/10.1007/978-3-642-22348-8_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free