2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.46
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Secure Secret Sharing in Distributed Online Social Networks

Abstract: Abstract-We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in a network of untrusted servers. Using a simple threshold-based secret sharing in such an environment is insufficiently secured since delegates keeping the secret shares may collude to steal the user's private keys.To mitigate this problem, we propose using different techniques to improve the system security: by selecting only … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 15 publications
0
22
0
Order By: Relevance
“…According to [10][11], nodes of low reputation will be randomly distributed among all groups if all nodes are randomly distributed among groups of size √ . For , the distribution of nodes is based on learning communities.…”
Section: Phase 1 Of : Construct Groups and Proxiesmentioning
confidence: 99%
“…According to [10][11], nodes of low reputation will be randomly distributed among all groups if all nodes are randomly distributed among groups of size √ . For , the distribution of nodes is based on learning communities.…”
Section: Phase 1 Of : Construct Groups and Proxiesmentioning
confidence: 99%
“…These networks constitute live platforms exploited by huge number of users for performing largescale computations such as conducting polls about political issues and seeking precise information on huge graph databases. To preserve data privacy during the running of these computations, recent works [8,9,10,12,27] use a simple secret sharing scheme which allows users to obfuscate their inputs. For instance, [7,9,10,12] proposed distributed polling protocols in social networks without requiring cryptographic system.…”
Section: Introductionmentioning
confidence: 99%
“…The decentralization is provided by the use of peer-to-peer technology. The work presented in [19] describes a new application of threshold-based secret sharing in a distributed OSN. The developed mechanism will select the most reliable delegates based on an effective trust measure.…”
Section: State-of-the-artmentioning
confidence: 99%