Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see. © 2010 Springer-Verlag.
CITATION STYLE
Nagaraja, S. (2010). Privacy amplification with social networks (transcript of discussion). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5964 LNCS, pp. 74–80). https://doi.org/10.1007/978-3-642-17773-6_8
Mendeley helps you to discover research relevant for your work.