Verifying Indistinguishability of Privacy-Preserving Protocols
Abstract
References
Index Terms
- Verifying Indistinguishability of Privacy-Preserving Protocols
Recommendations
Privacy-Preserving OpenID Connect
ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications SecurityOpenID Connect is the most widely used Internet protocol for delegated authentication today. It provides single sign-on functionality for users who use their account with an identity provider to authenticate to different services, called relying ...
Specifying Privacy-Preserving Protocols in Typed MSR
Privacy-preserving protocols, such as electronic cash, electronic voting and selective disclosure protocols, use special message constructors that are not widely used in other types of protocols (for example, in authentication protocols). These message ...
Fair and privacy-preserving multi-party protocols for reconciling ordered input sets
ISC'10: Proceedings of the 13th international conference on Information securityIn this paper, we introduce the first protocols for multiparty, privacy-preserving, fair reconciliation of ordered sets. Our contributions are twofold. First, we show that it is possible to extend the round-based construction for fair, two-party privacy-...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 341Total Downloads
- Downloads (Last 12 months)282
- Downloads (Last 6 weeks)64
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in