{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:52:15Z","timestamp":1762505535828,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108679"},{"type":"electronic","value":"9783642108686"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10868-6_14","type":"book-chapter","created":{"date-parts":[[2009,12,2]],"date-time":"2009-12-02T05:17:15Z","timestamp":1259731035000},"page":"236-251","source":"Crossref","is-referenced-by-count":4,"title":["A New Protocol for the Nearby Friend Problem"],"prefix":"10.1007","author":[{"given":"Sanjit","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Koray","family":"Karabina","sequence":"additional","affiliation":[]},{"given":"Alfred","family":"Menezes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/11507840_31","volume-title":"Financial Cryptography and Data Security","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 341\u2013356. Springer, Heidelberg (2005)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.pmcj.2006.12.002","volume":"3","author":"A. Amir","year":"2007","unstructured":"Amir, A., Efrat, A., Myllymaki, J., Palaniappan, L., Wampler, K.: Buddy tracking - efficient proximity detection among mobile friends. Pervasive and Mobile Computing\u00a03, 489\u2013511 (2007)","journal-title":"Pervasive and Mobile Computing"},{"doi-asserted-by":"crossref","unstructured":"Atallah, M., Du, W.: Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms \u2013 NSPW 2001. Association for Computing Machinery, pp. 13\u201322 (2001)","key":"14_CR3","DOI":"10.1145\/508171.508174"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-540-39927-8_28","volume-title":"Information and Communications Security","author":"F. Bao","year":"2003","unstructured":"Bao, F., Deng, R., Zhu, H.: Variations of Diffie-Hellman Problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 301\u2013312. Springer, Heidelberg (2003)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","first-page":"586","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 586\u2013615. Springer, Heidelberg (2001)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","first-page":"297","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 297\u2013319. Springer, Heidelberg (2001)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS)protocol, Technical report, Version 1.1 1483 RFC 4346, Internet Engineering Task Force (2006), http:\/\/www.ietf.org\/rfc\/rfc4346.txt","key":"14_CR8","DOI":"10.17487\/rfc4346"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transaction on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transaction on Information Theory"},{"unstructured":"FIPS\u00a0186-3, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-3, National Institute of Standards and Technology (2009)","key":"14_CR10"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Freedman","year":"2004","unstructured":"Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: ACM Symposium on Theory of Computing \u2013 STOC 1982, Association for Computing Machinery, pp. 365\u2013377 (1982)","key":"14_CR12","DOI":"10.1145\/800070.802212"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-03356-8_18","volume-title":"CRYPTO 2009","author":"T. Icart","year":"2009","unstructured":"Icart, T.: How to hash on elliptic curves. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 303\u2013316. Springer, Heidelberg (2009)"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. ACM SIGCOMM Computer Communication Review\u00a026, 5\u201326 (1996)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/3-540-68697-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Jakobsson","year":"1996","unstructured":"Jakobsson, M., Yung, M.: Proving without knowing: On oblivious, agnostic and blindfolded provers. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 186\u2013200. Springer, Heidelberg (1996)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/11535218_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"L. Kissner","year":"2005","unstructured":"Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 241\u2013257. Springer, Heidelberg (2005)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/11767831_4","volume-title":"Privacy Enhancing Technologies","author":"G. K\u00f8ien","year":"2006","unstructured":"K\u00f8ien, G., Oleshchuk, V.: Location privacy for cellular systems; analysis and solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 40\u201358. Springer, Heidelberg (2006)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"V. Shoup","year":"1997","unstructured":"Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 256\u2013266. Springer, Heidelberg (1997)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/11889663_14","volume-title":"Financial Cryptography and Data Security","author":"M. Szydlo","year":"2006","unstructured":"Szydlo, M.: A note on chosen-basis decisional Diffie-Hellman Assumptions. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol.\u00a04107, pp. 166\u2013170. Springer, Heidelberg (2006)"},{"unstructured":"Wang, S., Min, J., Yi, B.: Location based services for mobiles: Technologies and standards. In: IEEE International Conference on Communication \u2013 ICC (2008)","key":"14_CR20"},{"unstructured":"Zhong, G.: Distributed approaches for location privacy, Masters Thesis, University of Waterloo (2008)","key":"14_CR21"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-75551-7_5","volume-title":"Privacy Enhancing Technologies","author":"G. Zhong","year":"2007","unstructured":"Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 62\u201376. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10868-6_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T15:24:05Z","timestamp":1739460245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10868-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108679","9783642108686"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10868-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}