Privacy-preserving policy-based information transfer

26Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants' privacy. A common current scenario involves an authorized party (client) who needs to retrieve sensitive information held by another party (server) such that: (1) the former only gets the information for which it is duly authorized, (2) the latter does not learn what information information is retrieved. To address this scenario, in this paper, we introduce and explore the concept of Privacy-preserving Policy-based Information Transfer (PPIT). We construct three PPIT schemes based, respectively, on: RSA, Schnorr and IBE techniques. We then investigate various performance improvements and demonstrate the practicality of proposed PPIT schemes. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

De Cristofaro, E., Jarecki, S., Kim, J., & Tsudik, G. (2009). Privacy-preserving policy-based information transfer. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5672 LNCS, pp. 164–184). https://doi.org/10.1007/978-3-642-03168-7_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free