Efficient Cryptography for Information Privacy

نویسنده

  • Foteini Baldimtsi
چکیده

of “Efficient Cryptography for Information Privacy” by Foteini Baldimtsi, Ph.D., Brown University, May 2014. In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic transactions provide efficiency and convenience, they usually overlook the privacy of the users. This thesis studies privacy-enhancing technologies in order to get the best of both worlds: all the benefits of electronic transactions but without sacrificing user privacy. Using efficient cryptographic tools such as digital signatures, zero-knowledge proof systems and encryption schemes, we propose secure protocols that protect user privacy and at the same time are practical. Anonymous credential systems allow users to obtain and demonstrate possession of digital credentials in order to authenticate themselves in a privacy-preserving manner. We first show impossibility results on proving the security of one of the most well-known anonymous credential systems, the one due to Stefan Brands, that is currently being implemented by Microsoft under their credential management project, U-prove. Our impossibility result not only applies to Brands but generalizes to a much broader class of protocols. We then propose Anonymous Credentials Light : the first efficient single-use anonymous credential scheme that is provably secure. Cryptographic e-cash allows secure and private electronic payments and provides similar unforgeability and untraceability as physical cash does. Our Anonymous Credentials Light can be extended to an efficient e-cash scheme that moreover has the nice property of encoding users’ attributes in the coins. We provide a smartphone implementation of our proposed scheme and explain how it can be used for efficient and private payments in the public transportation scenario. A limitation of traditional cryptographic e-cash, however, is that it does not allow users to transfer coins to each other. We present the first practical, fully anonymous transferable e-cash scheme that does not

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Cryptography for Privacy Preserving Data Mining

Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the protection of sensible information has a relevant role. Thus privacy is becoming an increasingly important issue in many data mining applications. For that privacy secure distributed computation, which was done as part o...

متن کامل

Privacy Preserving Data Mining: Survey of Approaches

Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the protection of sensible information has a relevant role. Thus privacy is becoming an increasingly important issue in many data mining applications. For that privacy secure distributed computation, which was done as part o...

متن کامل

An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing Scheme

Privacy preserving data mining has gained considerable attention because of the increased concerns to ensure privacy of sensitive information. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to ex...

متن کامل

An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

The advances of data mining techniques played an important role in many areas for various applications. In context of privacy and security issues, the problems caused by association rule mining technique are recently investigated. The misuse of this technique may disclose the database owner’s sensitive information to others. Hence, the privacy of individuals is not maintained. Many of the resea...

متن کامل

Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy

In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, cloud server(CS) must prove to a verifier that he is actually storing all of the client's data unchanged. And, enabling public auditability for cloud storage is of critical importance to users with constrained com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014