TY - CHAP
T1 - Privacy-preserving reconciliation protocols
T2 - From theory to practice
AU - Meyer, Ulrike
AU - Wetzel, Susanne
PY - 2013
Y1 - 2013
N2 - In this paper we provide a brief summary of our work on privacy-preserving reconciliation protocols. The main focus of the paper is to review two of our two-party protocols. We detail the protocols and provide a comprehensive theoretical performance analysis. Furthermore, we briefly describe some of our work on multi-party protocols. We also show how we have translated our theoretical results into practice- including the design and implementation of a library as well as developing iPhone and Android apps.
AB - In this paper we provide a brief summary of our work on privacy-preserving reconciliation protocols. The main focus of the paper is to review two of our two-party protocols. We detail the protocols and provide a comprehensive theoretical performance analysis. Furthermore, we briefly describe some of our work on multi-party protocols. We also show how we have translated our theoretical results into practice- including the design and implementation of a library as well as developing iPhone and Android apps.
UR - http://www.scopus.com/inward/record.url?scp=84893375356&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893375356&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-42001-6_14
DO - 10.1007/978-3-642-42001-6_14
M3 - Chapter
AN - SCOPUS:84893375356
SN - 9783642420009
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 183
EP - 210
BT - Number Theory and Cryptography
A2 - Fischlin, Marc
A2 - Katzenbeisser, Stefan
ER -