A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini
نویسندگان
چکیده
منابع مشابه
Improved Private Set Intersection Against Malicious Adversaries
Private set intersection (PSI) refers to a special case of secure two-party computation in which the parties each have a set of items and compute the intersection of these sets without revealing any additional information. In this paper we present improvements to practical PSI providing security in the presence of malicious adversaries. Our starting point is the protocol of Dong, Chen & Wen (CC...
متن کاملPrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this paper we propose a model to improve the control the owner of private information has over its protection. This is achieved by classifying private information based on the purpose it is acquired for, and then designing met...
متن کاملProtect Mobile Agent against Malicious Host Using Partial-mobility Mechanism
A mobile agent is a promising area in distributed systems. It is a new technology for computers to communicate. Despite the multiple benefits of the mobile agent, but there are several obstacles to its spread. The mobile agent protection is one of these obstacles. In this paper a new mechanism has been proposed to protect mobile. The mechanism is called Partial-Mobility Mechanism (PMM). The mai...
متن کاملPrivate Information Retrieval in the Presence of Malicious Failures
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenges: the protection of users’ privacy and the assurance of service availability. We present a fault-tolerant scheme for private information retrieval (FT-PIR) that protects users’ privacy and ensures service provision in...
متن کاملRe-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption
In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext by a proxy, and thus can detect illegal acti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The KIPS Transactions:PartC
سال: 2006
ISSN: 1598-2858
DOI: 10.3745/kipstc.2006.13c.1.027