Privacy-Enhanced Searches Using Encrypted Bloom Filters

@article{Bellovin2004PrivacyEnhancedSU,
  title={Privacy-Enhanced Searches Using Encrypted Bloom Filters},
  author={Steven M. Bellovin and Bill Cheswick},
  journal={IACR Cryptology ePrint Archive},
  year={2004},
  volume={2004},
  pages={22}
}
It is often necessary for two or more or more parties that do not fully trust each other to share data selectively. For example, one intelligence agency might be willing to turn over certain documents to another such agency, but only if the second agency requests the specific documents. The problem, of course, is finding out that such documents exist when access to the database is restricted. We propose a search scheme based on Bloom filters and group ciphers such as Pohlig-Hellman encryption… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 103 CITATIONS

The State of the Art in Intrusion Prevention and Detection

VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Theory and Practice of Bloom Filters for Distributed Systems

VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Cryptographically Secure Bloom-Filters

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Identity-based registry for secure interdomain routing

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A Bloom Filter Based Model for Decentralized Authorization

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2004
2019

CITATION STATISTICS

  • 7 Highly Influenced Citations