A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Private Set Intersection Against Malicious Adversaries

Private set intersection (PSI) refers to a special case of secure two-party computation in which the parties each have a set of items and compute the intersection of these sets without revealing any additional information. In this paper we present improvements to practical PSI providing security in the presence of malicious adversaries. Our starting point is the protocol of Dong, Chen & Wen (CC...

متن کامل

PrivGuard : a model to protect private information based on its usage

No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this paper we propose a model to improve the control the owner of private information has over its protection. This is achieved by classifying private information based on the purpose it is acquired for, and then designing met...

متن کامل

Protect Mobile Agent against Malicious Host Using Partial-mobility Mechanism

A mobile agent is a promising area in distributed systems. It is a new technology for computers to communicate. Despite the multiple benefits of the mobile agent, but there are several obstacles to its spread. The mobile agent protection is one of these obstacles. In this paper a new mechanism has been proposed to protect mobile. The mechanism is called Partial-Mobility Mechanism (PMM). The mai...

متن کامل

Private Information Retrieval in the Presence of Malicious Failures

In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenges: the protection of users’ privacy and the assurance of service availability. We present a fault-tolerant scheme for private information retrieval (FT-PIR) that protects users’ privacy and ensures service provision in...

متن کامل

Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption

In this paper, we introduce a new functionality for proxy re-encryption (PRE) that we call re-encryption verifiability. In a PRE scheme with re-encryption verifiability (which we simply call verifiable PRE, or VPRE), a receiver of a re-encrypted ciphertext can verify whether the received ciphertext is correctly transformed from an original ciphertext by a proxy, and thus can detect illegal acti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The KIPS Transactions:PartC

سال: 2006

ISSN: 1598-2858

DOI: 10.3745/kipstc.2006.13c.1.027