Please use this identifier to cite or link to this item:
https://doi.org/10.1145/1921621.1921623
DC Field | Value | |
---|---|---|
dc.title | A security framework for privacy-preserving data aggregationin wireless sensor networks | |
dc.contributor.author | Chan, A.C.-F. | |
dc.contributor.author | Castelluccia, C. | |
dc.date.accessioned | 2013-07-04T07:37:38Z | |
dc.date.available | 2013-07-04T07:37:38Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Chan, A.C.-F., Castelluccia, C. (2011). A security framework for privacy-preserving data aggregationin wireless sensor networks. ACM Transactions on Sensor Networks 7 (4). ScholarBank@NUS Repository. https://doi.org/10.1145/1921621.1921623 | |
dc.identifier.issn | 15504859 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/39261 | |
dc.description.abstract | A formal treatment to the security of Concealed Data Aggregation (CDA) and the more general Private Data Aggregation (PDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA or PDA are still lacking. Standard security notions for public key encryption, including semantic security and indistinguishability against chosen ciphertext attacks, are refined to cover the multisender nature and aggregation functionality of CDA and PDA in the security model. The proposed security model is sufficiently general to cover most application scenarios and constructions of privacy-preserving data aggregation. An impossibility result on achieving security against adaptive chosen ciphertext attacks in CDA/PDA is shown. A generic CDA construction based on public key homomorphic encryption is given, along with a proof of its security in the proposed model. The security of a number of existing schemes is analyzed in the proposed model. © 2011 ACM. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1921621.1921623 | |
dc.source | Scopus | |
dc.subject | Adaptive chosen ciphertext attacks | |
dc.subject | Concealed data aggregation | |
dc.subject | Cryptography | |
dc.subject | Privacy-preserving data aggregation | |
dc.subject | Provable security | |
dc.subject | Semantic security | |
dc.type | Article | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1145/1921621.1921623 | |
dc.description.sourcetitle | ACM Transactions on Sensor Networks | |
dc.description.volume | 7 | |
dc.description.issue | 4 | |
dc.identifier.isiut | 000287918100002 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.