Privacy Protocols

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels. Security protocols set up secure channels using cryptographic primitives. Privacy protocols set up private channels using secure channels. But just like some security protocols can be broken without breaking the underlying cryptography, some privacy protocols can be broken without breaking the underlying security. Such privacy attacks have been used to leverage e-commerce against targeted advertising from the outset; but their depth and scope became apparent only with the overwhelming advent of influence campaigns in politics. The blurred boundaries between privacy protocols and privacy attacks present a new challenge for protocol analysis. Or maybe they do not, as the novelty is often in the eye of the observer. Cathy Meadows spearheaded and steered our research in security protocols. The methods for analyzing privacy protocols arise directly from her work.

Cite

CITATION STYLE

APA

Castiglione, J., Pavlovic, D., & Seidel, P. M. (2019). Privacy Protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11565 LNCS, pp. 167–191). Springer Verlag. https://doi.org/10.1007/978-3-030-19052-1_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free