Privacy amplification with social networks (transcript of discussion)

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Nagaraja, S. (2010). Privacy amplification with social networks (transcript of discussion). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5964 LNCS, pp. 74–80). https://doi.org/10.1007/978-3-642-17773-6_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free