Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity

Abstract : Bloom filters provide a space- and time-efficient mean to check the inclusion of an element in a set. In some applications it is beneficial, if the set represented by the Bloom filter is only revealed to authorized parties. Particularly, operations data in supply chain management can be very sensitive and Bloom filters can be applied to supply chain integrity validation. Despite the protection of the represented set, Bloom filter operations, such as the verification of set inclusion, need to be still feasible. In this paper we present privacy-preserving, publicly verifiable Bloom filters which offer both: privacy for the represented set and public Bloom filter operations. We give security proofs in the standard model.
Document type :
Conference papers
Complete list of metadatas

Cited literature [33 references]  Display  Hide  Download

https://hal.inria.fr/hal-01586579
Contributor : Hal Ifip <>
Submitted on : Wednesday, September 13, 2017 - 8:55:53 AM
Last modification on : Wednesday, September 13, 2017 - 2:28:20 PM
Long-term archiving on : Thursday, December 14, 2017 - 12:39:22 PM

File

978-3-642-22348-8_7_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Florian Kerschbaum. Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity. 23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.60-75, ⟨10.1007/978-3-642-22348-8_7⟩. ⟨hal-01586579⟩

Share

Metrics

Record views

40

Files downloads

84