2017 IEEE Trustcom/BigDataSE/Icess 2017
DOI: 10.1109/trustcom/bigdatase/icess.2017.347
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

Abstract: Promoting data sharing between organisations is challenging, without the added concerns over having actions traced. Even with encrypted search capabilities, the entities digital location and downloaded information can be traced, leaking information to the hosting organisation. This is a problem for law enforcement and government agencies, where any information leakage is not acceptable, especially for investigations. Anonymous routing is a technique to stop a host learning which agency is accessing information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
1

Year Published

2018
2018
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 30 publications
(35 reference statements)
0
5
0
1
Order By: Relevance
“…A query function f (i) = count(i) can get the number of persons with cancer in the first i line. Whether Alice has cancer or not can be calculated by count(5)−count (4). However, function f can provide ε-differential privacy such as f (i) = count(i)+noise.…”
Section: B Differential Privacymentioning
confidence: 99%
See 3 more Smart Citations
“…A query function f (i) = count(i) can get the number of persons with cancer in the first i line. Whether Alice has cancer or not can be calculated by count(5)−count (4). However, function f can provide ε-differential privacy such as f (i) = count(i)+noise.…”
Section: B Differential Privacymentioning
confidence: 99%
“…f (4) can output any item in {2, 2.5, 3} with the almost same probability. Thus, the attacker cannot obtain the result he wants by conducting count(5)−count (4). Therefore, the privacy of the dataset is protected by ε-differential privacy.…”
Section: B Differential Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…Timing attacks fault injection attacks electromagnetic attacks Many mathematical fault models presented in several publications are found to be difficult to implement in real life [4] High precision measuring and fault injection tools are required by bit fault models. The cost involved in implementing that algorithm is very higher and also the system that is proposed in this paper is perfect when it is compared with the protocols that are used in the existing system as countermeasures.…”
Section: Cryptographic Algorithmsmentioning
confidence: 99%