Authentic Attributes with Fine-Grained Anonymity Protection
نویسندگان
چکیده
Collecting accurate pro le information and protecting an individual's privacy are ordinarily viewed as being at odds. This paper presents mechanisms that protect individual privacy while presenting accurate|indeed authenticated|pro le information to servers and merchants. In particular, we give a pseudonym registration scheme and system that enforces unique user registration while separating trust required of registrars, issuers, and validators. This scheme enables the issuance of global unique pseudonyms (GUPs) and attributes enabling practical applications such as authentication of accurate attributes and enforcement of \one-to-acustomer" properties. We also present a scheme resilient to even pseudonymous pro ling yet preserving the ability of merchants to authenticate the accuracy of information. It is the rst mechanism of which the authors are aware to guarantee recent validity for group signatures, and more generally multigroup signatures, thus e ectively enabling revocation of all or some of the multi-group certi cates held by a principal.
منابع مشابه
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Biobanks are gaining in importance by storing large collections of patient’s clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) together with biological materials such as tissue samples, blood or other body fluids. When releasing these patientspecific data for medical studies privacy protection has to be guaranteed for ethical and legal reasons. k-anonymity may b...
متن کاملBuilding a Taxonomy of Attributes for Fine-Grained Scene Understanding
This paper presents the first effort to discover and exploit a diverse taxonomy of scene attributes. Starting with the fine-grained SUN database, we perform crowd-sourced human studies to find over 100 attributes that discriminate between scene categories. We construct an attributelabeled dataset on top of the SUN database [7]. This “SUN Attribute database” spans more than 700 categories and 14...
متن کاملMulti-dimensional k-anonymity Based on Mapping for Protecting Privacy
Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...
متن کاملMulti-dimensional K-anonymity based on Mapping for Protecting Privacy1
Data release has privacy disclosure risk if not taking any protection policy. Although attributes that clearly identify individuals, such as Name, Identity Number, are generally removed or decrypted, attackers can still link these databases with other released database on attributes (Quasi-identifiers) to re-identify individual’s private information. K-anonymity is a significant method for priv...
متن کاملTowards practical and fundamental limits of anonymity protection
A common function of anonymity systems is the embedding of subjects that are associated to some attributes in a set of subjects, the anonymity set. Every subject within the anonymity set appears to be possibly associated to attributes of every other subject within it. The anonymity set covers the associations between the subjects and their attributes. The limit of anonymity protection basically...
متن کامل