Privacy amplification with social networks (transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see.

LanguageEnglish
Title of host publicationSecurity Protocols - 15th International Workshop, Revised Selected Papers
EditorsB. Christianson , B. Crispo , J. A. Malcolm , m. Roe
Place of PublicationBerlin
PublisherSpringer
Pages74-80
Number of pages7
Volume5964
ISBN (Print)3642177727, 9783642177729
DOIs
Publication statusPublished - 1 Dec 2010
Event15th International Workshop on Security Protocols - Brno, Czech Republic
Duration: 18 Apr 200720 Apr 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5964 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Workshop on Security Protocols
CountryCzech Republic
CityBrno
Period18/04/0720/04/07

Fingerprint

Amplification
Social Networks
Privacy
Program processors
Decentralized
Context
Human
Character

Keywords

  • social network
  • short path
  • random walk
  • mesh network
  • common node

Cite this

Nagaraja, S. (2010). Privacy amplification with social networks (transcript of discussion). In B. Christianson , B. Crispo , J. A. Malcolm , & M. Roe (Eds.), Security Protocols - 15th International Workshop, Revised Selected Papers (Vol. 5964 , pp. 74-80). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5964 LNCS). Berlin: Springer. https://doi.org/10.1007/978-3-642-17773-6_8
Nagaraja, Shishir. / Privacy amplification with social networks (transcript of discussion). Security Protocols - 15th International Workshop, Revised Selected Papers. editor / B. Christianson ; B. Crispo ; J. A. Malcolm ; m. Roe . Vol. 5964 Berlin : Springer, 2010. pp. 74-80 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{7006141199a840719cb38db29c734432,
title = "Privacy amplification with social networks (transcript of discussion)",
abstract = "Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see.",
keywords = "social network, short path, random walk, mesh network, common node",
author = "Shishir Nagaraja",
year = "2010",
month = "12",
day = "1",
doi = "10.1007/978-3-642-17773-6_8",
language = "English",
isbn = "3642177727",
volume = "5964",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "74--80",
editor = "{Christianson }, B. and {Crispo }, B. and {Malcolm }, {J. A.} and {Roe }, m.",
booktitle = "Security Protocols - 15th International Workshop, Revised Selected Papers",

}

Nagaraja, S 2010, Privacy amplification with social networks (transcript of discussion). in B Christianson , B Crispo , JA Malcolm & M Roe (eds), Security Protocols - 15th International Workshop, Revised Selected Papers. vol. 5964 , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5964 LNCS, Springer, Berlin, pp. 74-80, 15th International Workshop on Security Protocols, Brno, Czech Republic, 18/04/07. https://doi.org/10.1007/978-3-642-17773-6_8

Privacy amplification with social networks (transcript of discussion). / Nagaraja, Shishir.

Security Protocols - 15th International Workshop, Revised Selected Papers. ed. / B. Christianson ; B. Crispo ; J. A. Malcolm ; m. Roe . Vol. 5964 Berlin : Springer, 2010. p. 74-80 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5964 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

TY - GEN

T1 - Privacy amplification with social networks (transcript of discussion)

AU - Nagaraja, Shishir

PY - 2010/12/1

Y1 - 2010/12/1

N2 - Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see.

AB - Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see.

KW - social network

KW - short path

KW - random walk

KW - mesh network

KW - common node

UR - http://www.scopus.com/inward/record.url?scp=78650833819&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-17773-6_8

DO - 10.1007/978-3-642-17773-6_8

M3 - Conference contribution book

SN - 3642177727

SN - 9783642177729

VL - 5964

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 74

EP - 80

BT - Security Protocols - 15th International Workshop, Revised Selected Papers

A2 - Christianson , B.

A2 - Crispo , B.

A2 - Malcolm , J. A.

A2 - Roe , m.

PB - Springer

CY - Berlin

ER -

Nagaraja S. Privacy amplification with social networks (transcript of discussion). In Christianson B, Crispo B, Malcolm JA, Roe M, editors, Security Protocols - 15th International Workshop, Revised Selected Papers. Vol. 5964 . Berlin: Springer. 2010. p. 74-80. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-17773-6_8