{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:15:15Z","timestamp":1756898115143,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223471"},{"type":"electronic","value":"9783642223488"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22348-8_7","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:59:57Z","timestamp":1309283997000},"page":"60-75","source":"Crossref","is-referenced-by-count":5,"title":["Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kerschbaum","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Bellovin, S., Cheswick, W.: Privacy-Enhanced Searches Using Encrypted Bloom Filters. Cryptology ePrint Archive Report 2004\/022 (2004)"},{"key":"7_CR2","unstructured":"Blass, E., Elkhiyaoui, K., Molva, R.: Tracker: Security and Privacy for RFID-based Supply Chains. In: Proceedinsg of the 18th Network and Distributed System Security Symposium, pp. 455\u2013472 (2011)"},{"issue":"7","key":"7_CR3","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/Time Trade-offs in Hash Coding with Allowable Errors. Communication of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communication of the ACM"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Blum, M., Feldman, P., Micali, S.: Non-Interactive Zero-Knowledge and Its Applications. In: Proceedings of the 20th ACM Symposium on Theory of Computing, pp. 103\u2013112 (1988)","DOI":"10.1145\/62212.62222"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A. Broder","year":"2003","unstructured":"Broder, A., Mitzenmacher, M.: Network Applications of Bloom Filters: A Survey. Internet Mathematics\u00a01(4), 485\u2013509 (2003)","journal-title":"Internet Mathematics"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-03549-4_7","volume-title":"Financial Cryptography and Data Security","author":"J. Camenisch","year":"2009","unstructured":"Camenisch, J., Zaverucha, G.: Private Intersection of Certified Sets. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 108\u2013127. Springer, Heidelberg (2009)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-01957-9_8","volume-title":"Applied Cryptography and Network Security","author":"D. Dachman-Soled","year":"2009","unstructured":"Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.\u00a05536, pp. 125\u2013142. Springer, Heidelberg (2009)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-17373-8_13","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"E. Cristofaro De","year":"2010","unstructured":"De Cristofaro, E., Kim, J., Tsudik, G.: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol.\u00a06477, pp. 213\u2013231. Springer, Heidelberg (2010)"},{"issue":"3-4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10660-010-9062-0","volume":"10","author":"M. Eurich","year":"2010","unstructured":"Eurich, M., Oertel, N., Boutellier, R.: The Impact of Perceived Privacy Risks on Organizations\u2019 Willingness to Share Item-Level Event Data Across the Supply Chain. Electronic Commerce Research\u00a010(3-4), 423\u2013440 (2010)","journal-title":"Electronic Commerce Research"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"7_CR11","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification","author":"K. Finkenzeller","year":"2003","unstructured":"Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, Inc., Chichester (2003)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Freedman","year":"2004","unstructured":"Freedman, M., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"7_CR13","unstructured":"Fujitsu. Fujitsu Develops World\u2019s First 64KByte High-Capacity FRAM RFID Tag for Aviation Applications. Press Release (2008), http:\/\/www.fujitsu.com\/global\/news\/pr\/archives\/month\/2008\/20080109-01.html"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully Homomorphic Encryption using Ideal Lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Goh, E.: Secure Indexes. Cryptology ePrint Archive Report 2003\/216 (2003)","DOI":"10.1108\/09696470310476981"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1145\/116825.116852","volume":"38","author":"O. Goldreich","year":"1991","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: Proofs that Yield Nothing but Their Validity or All Languages in NP have Zero-Knowledge Proof Systems. Journal of the ACM\u00a038(3), 690\u2013728 (1991)","journal-title":"Journal of the ACM"},{"issue":"2","key":"7_CR17","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and Systems Science\u00a028(2), 270\u2013299 (1984)","journal-title":"Journal of Computer and Systems Science"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-540-78967-3_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J. Groth","year":"2008","unstructured":"Groth, J., Ishai, Y.: Sub-Linear Zero-Knowledge Argument for Correctness of a Shuffle. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 379\u2013396. Springer, Heidelberg (2008)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-540-78524-8_10","volume-title":"Theory of Cryptography","author":"C. Hazay","year":"2008","unstructured":"Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol.\u00a04948, pp. 155\u2013175. Springer, Heidelberg (2008)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall\/CRC (2007)","DOI":"10.1201\/9781420010756"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-16822-2_12","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"F. Kerschbaum","year":"2010","unstructured":"Kerschbaum, F., Oertel, N.: Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 124\u2013137. Springer, Heidelberg (2010)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/11535218_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"L. Kissner","year":"2005","unstructured":"Kissner, L., Song, D.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 241\u2013257. Springer, Heidelberg (2005)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Lehtonen, M., Michahelles, F., Fleisch, E.: How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. In: Proceedings of the IEEE RFID Conference, pp. 257\u2013264 (2009)","DOI":"10.1109\/RFID.2009.4911190"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 234\u2013241 (2007)","DOI":"10.1145\/1229285.1229318"},{"key":"7_CR25","first-page":"131","volume":"2","author":"R. Nojima","year":"2009","unstructured":"Nojima, R., Kadobayashi, Y.: Cryptographically Secure Bloom-Filters. Transactions on Data Privacy\u00a02, 131\u2013139 (2009)","journal-title":"Transactions on Data Privacy"},{"key":"7_CR26","unstructured":"Oertel, N.: Tracking based product authentication: Catching intruders in the supply chain. In: Proceedings of the 17th European Conference on Information Systems (2008)"},{"key":"7_CR27","unstructured":"Ouafi, K., Vaudenay, S.: Pathchecker: an RFID Application for Tracing Products in Suply-Chains. In: Proceedings of the 5th Workshop on RFID Security (2009)"},{"issue":"10","key":"7_CR28","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/1400181.1400209","volume":"51","author":"B. Santos","year":"2008","unstructured":"Santos, B., Smith, L.: RFID in the supply chain: panacea or pandora\u2019s box? Communications of the ACM\u00a051(10), 127\u2013131 (2008)","journal-title":"Communications of the ACM"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Sander, T., Young, A., Yung, M.: Non-Interactive CryptoComputing For NC1. In: Proceedings of the 40th Symposium on Foundations of Computer Science, pp. 554\u2013567 (1999)","DOI":"10.1109\/SFFCS.1999.814630"},{"issue":"6","key":"7_CR30","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/40.977758","volume":"21","author":"S. Sarma","year":"2001","unstructured":"Sarma, S., Brock, D., Engels, D.: Radio frequency identification and the electronic product code. IEEE Micro\u00a021(6), 50\u201354 (2001)","journal-title":"IEEE Micro"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network \u2013 The Potential of RFID in Anti-Counterfeiting. In: Proceedings of the 20th ACM Symposium on Applied Computing, pp. 1607\u20131612 (2005)","DOI":"10.1145\/1066677.1067041"},{"issue":"1","key":"7_CR32","first-page":"88","volume":"10","author":"M. Waldbaum","year":"1998","unstructured":"Waldbaum, M., Nguyen, X.: Using Creativity to Fight a $60 Billion Consumer Problem \u2013 Counterfeit Goods. Loyola Chicago Consumer Law Review\u00a010(1), 88 (1998)","journal-title":"Loyola Chicago Consumer Law Review"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Zanetti, D., Fellmann, L., Capkun, S.: Privacy-preserving Clone Detection for RFID-enabled Supply Chains. In: Proceedings of the IEEE International Conference on RFID, pp. 37\u201344 (2010)","DOI":"10.1109\/RFID.2010.5467257"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22348-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T20:02:11Z","timestamp":1741291331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22348-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223471","9783642223488"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22348-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}