Privacy amplification with social networks (transcript of discussion)

Shishir Nagaraja

Research output: Chapter in Book/Report/Conference proceedingConference contribution book


Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see.

Original languageEnglish
Title of host publicationSecurity Protocols - 15th International Workshop, Revised Selected Papers
EditorsB. Christianson , B. Crispo , J. A. Malcolm , m. Roe
Place of PublicationBerlin
Number of pages7
ISBN (Print)3642177727, 9783642177729
Publication statusPublished - 1 Dec 2010
Event15th International Workshop on Security Protocols - Brno, Czech Republic
Duration: 18 Apr 200720 Apr 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5964 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference15th International Workshop on Security Protocols
Country/TerritoryCzech Republic


  • social network
  • short path
  • random walk
  • mesh network
  • common node


Dive into the research topics of 'Privacy amplification with social networks (transcript of discussion)'. Together they form a unique fingerprint.

Cite this