Privacy-preserving reconciliation protocols: From theory to practice

Ulrike Meyer, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In this paper we provide a brief summary of our work on privacy-preserving reconciliation protocols. The main focus of the paper is to review two of our two-party protocols. We detail the protocols and provide a comprehensive theoretical performance analysis. Furthermore, we briefly describe some of our work on multi-party protocols. We also show how we have translated our theoretical results into practice- including the design and implementation of a library as well as developing iPhone and Android apps.

Original languageEnglish
Title of host publicationNumber Theory and Cryptography
Subtitle of host publicationPapers in Honor of Johannes Buchmann on the Ocasion of His 60th Birthday
EditorsMarc Fischlin, Stefan Katzenbeisser
Pages183-210
Number of pages28
DOIs
StatePublished - 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8260 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Fingerprint

Dive into the research topics of 'Privacy-preserving reconciliation protocols: From theory to practice'. Together they form a unique fingerprint.

Cite this