The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
Realizing Hash-and-Sign Signatures under Standard Assumptions
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
On the Portability of Generalized Schnorr Proofs
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Oblivious transfer with access control
Proceedings of the 16th ACM conference on Computer and communications security
An analysis of social network-based Sybil defenses
Proceedings of the ACM SIGCOMM 2010 conference
A new framework for efficient password-based authenticated key exchange
Proceedings of the 17th ACM conference on Computer and communications security
IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
IEEE Wireless Communications
On Broadcast Authentication in Wireless Sensor Networks
IEEE Transactions on Wireless Communications
Efficient lookup on unstructured topologies
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In current Online Social Networks (OSNs), it is necessary for a user to determine whether a claimed public key belongs to a target user. In this paper, we design a system to complete this task. We first find a common friend between two users and let her help to prove the ownership of the public key. The common friend is proved to exist with high probability in fast mixing OSNs. We also propose a protocol to securely compute the intersection of friend sets. The effectiveness of the system is demonstrated by simulation.