Cryptographically Secure Bloom-Filters

نویسندگان

  • Ryo Nojima
  • Youki Kadobayashi
چکیده

In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter has many applications such as hash-based IP-traceback systems and Web cache sharing. In some of those applications, equipping the Bloom-filter with the privacy-preserving mechanism is crucial for the deployment. In this paper, we propose a cryptographically secure privacy-preserving Bloom-filter protocol. We propose such two protocols based on blind signatures and oblivious pseudorandom functions, respectively. To show that the proposed protocols are secure, we provide a reasonable security definition and prove the security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation and Evaluation of Improved Secure Index Scheme Using Standard and Counting Bloom Filters

This paper presents an improved Secure Index scheme as a searchable symmetric encryption technique and provides a solution that enables a secure and efficient data storage and retrieval system. Secure Index scheme, conceived by Goh, is based on standard Bloom filters (SBFs). Knowledge of the limitations of SBFs, such as handling insertions but not deletions, helps in understanding the advantage...

متن کامل

BloomCasting: Security in Bloom Filter Based Multicast

Traditional multicasting techniques give senders and receivers little control for who can receive or send to the group and enable end hosts to attack the multicast infrastructure by creating large amounts of group specific state. Bloom filter based multicast has been proposed as a solution to scaling multicast to large number of groups. In this paper, we study the security of multicast built on...

متن کامل

Introduction to Laboratory Research : Evaluation of a Distributed Key Certification using Accumulators in very Constrained Wireless Sensor Networks

In this work we demonstrate that the distributed key certification accumulator based protocol proposed in [1] works well on low-power and memory constrained devices such as WSN430 and MB851 sensors. We observed that in large-scale sensor networks, accumulators based on elliptic curve cryptography (ECC) are much more convenient to use than secure Bloom filters because of their larger memory foot...

متن کامل

Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator

Resources such as storage and network as a service to organizations and customers in reduced cost by cloud computing. The documents stored in cloud are of huge size and due to its sensitivity arises security and storage problems. Data is stored on remote location in cloud and cryptographic techniques resolve problems of data security. To ensure data to be secure in cloud, the client encrypts da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Trans. Data Privacy

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2009