Specifying and implementing privacy-preserving cryptographic protocols
نویسندگان
چکیده
منابع مشابه
Secure signal processing: Privacy preserving cryptographic protocols for multimedia
The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready to go fully i...
متن کاملCryptographic Techniques for Privacy Preserving Identity
Cryptographic Techniques for Privacy Preserving Identity
متن کاملPrivacy Compliance Verification in Cryptographic Protocols
To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the tr...
متن کاملDesign and Analysis of Privacy-Preserving Protocols
More and more of our daily activities are using the Internet to provide an easy way to get access to instant information. The equipment enabling these interactions is also storing information such as: access time, where you are, and what you plan to do. The ability to store this information is very convenient but is also the source of a major concern: once data are stored, it must be protected....
متن کاملEfficient Privacy Preserving Protocols for Visual Computation
The rapid expansion of the Internet is receiving a great deal of attention world-wide. The technological developments and the increase in online communications have played a vital role in revolutionalizing the Information Age. There is a tremendous growth of online applications to manipulate the user’s personal data, which has resulted in the widespread availability of the user’s personal data ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2008
ISSN: 1615-5262,1615-5270
DOI: 10.1007/s10207-008-0057-y