Authentic Attributes with Fine-Grained Anonymity Protection

نویسندگان

  • Stuart G. Stubblebine
  • Paul F. Syverson
چکیده

Collecting accurate pro le information and protecting an individual's privacy are ordinarily viewed as being at odds. This paper presents mechanisms that protect individual privacy while presenting accurate|indeed authenticated|pro le information to servers and merchants. In particular, we give a pseudonym registration scheme and system that enforces unique user registration while separating trust required of registrars, issuers, and validators. This scheme enables the issuance of global unique pseudonyms (GUPs) and attributes enabling practical applications such as authentication of accurate attributes and enforcement of \one-to-acustomer" properties. We also present a scheme resilient to even pseudonymous pro ling yet preserving the ability of merchants to authenticate the accuracy of information. It is the rst mechanism of which the authors are aware to guarantee recent validity for group signatures, and more generally multigroup signatures, thus e ectively enabling revocation of all or some of the multi-group certi cates held by a principal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures

Biobanks are gaining in importance by storing large collections of patient’s clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) together with biological materials such as tissue samples, blood or other body fluids. When releasing these patientspecific data for medical studies privacy protection has to be guaranteed for ethical and legal reasons. k-anonymity may b...

متن کامل

Building a Taxonomy of Attributes for Fine-Grained Scene Understanding

This paper presents the first effort to discover and exploit a diverse taxonomy of scene attributes. Starting with the fine-grained SUN database, we perform crowd-sourced human studies to find over 100 attributes that discriminate between scene categories. We construct an attributelabeled dataset on top of the SUN database [7]. This “SUN Attribute database” spans more than 700 categories and 14...

متن کامل

Multi-dimensional k-anonymity Based on Mapping for Protecting Privacy

Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...

متن کامل

Multi-dimensional K-anonymity based on Mapping for Protecting Privacy1

Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...

متن کامل

Towards practical and fundamental limits of anonymity protection

A common function of anonymity systems is the embedding of subjects that are associated to some attributes in a set of subjects, the anonymity set. Every subject within the anonymity set appears to be possibly associated to attributes of every other subject within it. The anonymity set covers the associations between the subjects and their attributes. The limit of anonymity protection basically...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000