Privacy amplification with social networks (transcript of discussion)

Shishir Nagaraja*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see.

Original languageEnglish
Title of host publicationSecurity Protocols - 15th International Workshop, Revised Selected Papers
EditorsB. Christianson , B. Crispo , J. A. Malcolm , m. Roe
Place of PublicationBerlin
PublisherSpringer
Pages74-80
Number of pages7
Volume5964
ISBN (Print)3642177727, 9783642177729
DOIs
Publication statusPublished - 1 Dec 2010
Event15th International Workshop on Security Protocols - Brno, Czech Republic
Duration: 18 Apr 200720 Apr 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5964 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Workshop on Security Protocols
Country/TerritoryCzech Republic
CityBrno
Period18/04/0720/04/07

Keywords

  • social network
  • short path
  • random walk
  • mesh network
  • common node

Fingerprint

Dive into the research topics of 'Privacy amplification with social networks (transcript of discussion)'. Together they form a unique fingerprint.

Cite this