Refine
Year of publication
- 2014 (286) (remove)
Document Type
- Article (142)
- Conference Proceeding (67)
- Part of a Book (30)
- Book (21)
- Report (8)
- Other (6)
- Bachelor Thesis (3)
- Patent (2)
- Part of Periodical (2)
- Doctoral Thesis (1)
- Master's Thesis (1)
- Video (1)
- Poster (1)
- Talk (1)
Keywords
- Antarctic Glaciology (1)
- Bloom Taxonomy (1)
- Bone sawing (1)
- COMSOL Multiphysics (1)
- Calorimetric gas sensor (1)
- Cryptographic protocols (1)
- DNA hybridization (1)
- Extraterrestrial Glaciology (1)
- Field-effect sensor (1)
- Glaciological instruments and methods (1)
- Hydrogen peroxide (1)
- LAPS (1)
- Light-addressable Potentiometric Sensor (1)
- LiveLink for MATLAB (1)
- Malicious model (1)
- Multi-sensor system (1)
- Optimization module (1)
- Privacy-enhancing technologies (1)
- Secure multi-party computation (1)
- Subclacial exploration (1)
Institute
- Fachbereich Medizintechnik und Technomathematik (65)
- Fachbereich Elektrotechnik und Informationstechnik (43)
- Fachbereich Wirtschaftswissenschaften (41)
- Fachbereich Energietechnik (40)
- INB - Institut für Nano- und Biotechnologien (35)
- Fachbereich Chemie und Biotechnologie (31)
- IfB - Institut für Bioengineering (25)
- Fachbereich Maschinenbau und Mechatronik (21)
- Fachbereich Luft- und Raumfahrttechnik (13)
- Fachbereich Bauingenieurwesen (12)
- Solar-Institut Jülich (6)
- Fachbereich Architektur (3)
- Sonstiges (3)
- FH Aachen (2)
- ECSM European Center for Sustainable Mobility (1)
- Fachbereich Gestaltung (1)
- Institut fuer Angewandte Polymerchemie (1)
- ZHQ - Bereich Hochschuldidaktik und Evaluation (1)
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.