Saving On-Line Privacy

@inproceedings{Camenisch2009SavingOP,
  title={Saving On-Line Privacy},
  author={Jan Camenisch and Gregory Neven},
  booktitle={PrimeLife},
  year={2009}
}
With the increasing use of electronic media for our daily transactions, we widely distribute our personal information. Once released, controlling the dispersal of these information is virtually impossible. Privacy-enhancing technologies can help to minimize the amount of information that needs to be revealed in transactions, on the one hand, and to limit the dispersal, on the other hand. Unfortunately, these technologies are hardly used today. In this paper we aim to foster the adoption by… 

Traitor Tracing and Revocation Mechanisms with Privacy-Preserving

  • Yi DingLei Fan
  • Computer Science
    2011 Seventh International Conference on Computational Intelligence and Security
  • 2011
This scheme adds this important privacy-preserving feature into the existing content distribution system, and with the help of a trusted third party it can efficiently trace and revoke the pirate users while still preserve the privacy of honest users.

Fair Anonymous Authentication for Location Based Services

An efficient anonymous authentication scheme that provides untraceability and unlinkability of mobile devices, while accessing Location-Based Services, and provides formal security proofs based on the intractability of the Divisible Diffie-Hellman assumption.

AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography

This paper proposes and demonstrates the use of the Ciphertext Policy Attribute Based Encryption (CP-ABE) to improve the overhead in the existing onion routing schemes as well as to improve their overall security strength.

Right Transfer Method Based on Double HASH Chain

The right transfer program based on double HASH chain achieves the transfer of the digital right under the control of HASH Distance and meta-rights and security analysis shows that the authentication, integrity, confidentiality, and impartiality of the program are well guaranteed.

References

SHOWING 1-10 OF 68 REFERENCES

A Language Enabling Privacy-Preserving Access Control

This work proposes an authorization language that allows for expressing access control requirements in a privacy-preserving way and sees its proposal as an important step towards making access control systems privacy- Preserving.

Balancing Accountability and Privacy Using E-Cash (Extended Abstract)

This work presents the first e-cash system that makes this possible without a trusted party, and is secure under the same complexity assumptions in the random-oracle model.

A card requirements language enabling privacy-preserving access control

This work proposes an authorization language that allows for expressing access control requirements in a privacy-preserving way and sees its proposal as an important step towards making access control systems privacy- Preserving.

Blind Signatures for Untraceable Payments

Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the

The platform for privacy preferences

It is believed users' confidence in online transactions will increase when they are presented with meaningful information and choices about Web site privacy practices, and P3P is not a silver bullet; it is complemented by other technologies as well as regulatory and self-regulatory approaches to privacy.

A Formal Treatment of Onion Routing

This work provides a formal definition of onion-routing in the universally composable framework, and discovers a simpler definition that implies security in the UC framework and exhibits an efficient and easy to implement construction of an onion routing scheme satisfying this definition.

Private Searching on Streaming Data

In this paper we consider the problem of private searching on streaming data, where we can efficiently implement searching for documents that satisfy a secret criteria (such as the presence or

An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation

This paper proposes a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones.

Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy

Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures.

Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2

Digital credentials and certificates can easily be shared and copied, but the honest user is also at risk of identity theft: malicious software such as viruses and worms or phishing attacks can without too much difficulty steal her credentials.
...