A Public-Key Protocol for Social Networks with Private Relationships
نویسنده
چکیده
The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks deal with the protection of resources and data, i.e. with deciding whether access to resources and data held by a user (owner) should be granted to a requesting user (requestor). However, the relationships between users are also sensitive and need protection: knowing who is trusted by a user and to what extent leaks a lot of confidential information about that user. The use of symmetric key cryptography to implement private relationships in social networks has recently been proposed. We show in this paper how to use public-key cryptography to reduce the overhead caused by private relationships.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملSocialVPN: Enabling wide-area collaboration with integrated social and overlay networks
Trusted collaborative systems require peers to be able to communicate over private, authenticated end-to-end channels. Network-layer approaches such as Virtual Private Networks (VPNs) exist, but require considerable setup and management which hinder the establishment of ad-hoc collaborative environments: trust needs to be established, cryptographic keys need to be exchanged, and private network...
متن کاملOn Storing Private Keys in the Cloud
Many future applications, such as distributed social networks, will rely on public-key cryptography, and users will want to access them from many locations. Currently, there is no way to store private keys in the cloud without placing complete faith in a centralised operator. We propose a protocol that can be used to share secrets such as private keys among several key recovery agents, using a ...
متن کاملThe Virtual Social Networks and Couples’ Commitment
Technologies and various media have affected social institutions such as family and causeshape changes in relationships within the family. One of the means of communication that are easilyand widely used in the household is Internet. With the entrance of media, especially the Internet tothe family, changes in personal, social, public and private relationships are occurred. The use ofsocial netw...
متن کاملBridge Certification Authorities: Connecting B2B Public Key Infrastructures
Businesses are deploying Public Key Infrastructures (PKIs) to support internal business processes, implement virtual private networks, and secure corporate assets. In addition, most businesses have industrial partnerships with other businesses for economic reasons. If these industrial alliances wish to exploit their internal security capabilities for businessto-business (B2B) electronic commerc...
متن کامل