Efficient private bidding and auctions with an oblivious third party
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A practical approach to solve Secure Multi-party Computation problems
Proceedings of the 2002 workshop on New security paradigms
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Efficient cryptographic protocol design based on distributed el gamal encryption
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
A survey of computational location privacy
Personal and Ubiquitous Computing
Hide & Crypt: Protecting Privacy in Proximity-Based Services
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
A New Protocol for the Nearby Friend Problem
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Security analysis of the Louis protocol for location privacy
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Characterizing the transport behaviour of the short message service
Proceedings of the 8th international conference on Mobile systems, applications, and services
Preserving location and absence privacy in geo-social networks
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
Cybercasing the joint: on the privacy implications of geo-tagging
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract
Transactions on Data Privacy
Privacy in mobile computing for location-sharing-based services
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
A privacy preserving system for friend locator applications
Proceedings of the 9th ACM international symposium on Mobility management and wireless access
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Impeding individual user profiling in shopper loyalty programs
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Multiparty proximity testing with dishonest majority from equality testing
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part II
Location privacy attacks based on distance and density information
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
Techniques to protect privacy against inference attacks in location based services
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Private proximity testing with an untrusted server
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Private proximity detection for convex polygons
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
A hybrid approach for privacy-preserving processing of knn queries in mobile database systems
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.00 |
Location privacy is of utmost concern for location-based services. It is the property that a person's location is revealed to other entities, such as a service provider or the person's friends, only if this release is strictly necessary and authorized by the person. We study how to achieve location privacy for a service that alerts people of nearby friends. Here, location privacy guarantees that users of the service can learn a friend's location if and only if the friend is actually nearby. We introduce three protocols--Louis, Lester and Pierre--that provide location privacy for such a service. The key advantage of our protocols is that they are distributed and do not require a separate service provider that is aware of people's locations. The evaluation of our sample implementation demonstrates that the protocols are sufficiently fast to be practical.