Back to Results
First PageMeta Content
ElGamal encryption / RSA / Oblivious transfer / XTR / Ciphertext / Cryptography / Public-key cryptography / Cryptographic protocols


3-6 T  oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems hav
Add to Reading List

Document Date: 2012-03-11 23:15:00


Open Document

File Size: 2,52 MB

Share Result on Facebook

Company

AES / Security Fundamentals Laboratory / /

Facility

National Institute of Information / /

IndustryTerm

Σ-protocol / set-intersection protocol / symmetric encryption protocol / decryption algorithm / attractive technology / cryptographic protocols / oblivious symmetric encryption protocol / Secure set-intersection protocol / cryptographic protocol / encryption algorithm / This protocol / /

OperatingSystem

DOS / /

Organization

National Institute of Information and Communications Technology Vol. / /

Person

Kobbi Nissim / Bob / Alice / Benny Pinkas / /

Position

Senior Researcher / /

Product

Modified ElGamal / /

ProgrammingLanguage

Pascal / /

ProvinceOrState

Virginia / /

Technology

blivious symmetric encryption / IP-traceback technology / encryption algorithm / studying/developing IP-traceback technology / cryptographic protocol / Obvious DES protocol / Communications Technology / attractive technology / secret key / aiming protocol / blind signature Fig.5 Secure set-intersection protocol / oblivious symmetric encryption protocol / oblivious symmetric encryption / set-intersection protocol / encryption / message M. This protocol / ecret key encryption Secret key encryption / cryptography / public key / Secure set-intersection protocol / public-key encryption / oward Realizing Privacy-Preserving IP-Traceback NOJIMA Ryo The IP-traceback technology / 3.2 Method Secure set-intersection protocol / Private-indexing protocol / This protocol / 2.1 Private-indexing protocol / symmetric encryption protocol / secret key encryption / decryption algorithm / IPtraceback technology / privacy-preserving IP-traceback technology / Oblivious Symmetric Key Encryption / /

SocialTag