Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Algorithmic Game Theory
A polynomial-time approximation to optimal multivariate microaggregation
Computers & Mathematics with Applications
Privacy homomorphisms for social networks with private relationships
Computer Networks: The International Journal of Computer and Telecommunications Networking
Asymmetric Group Key Agreement
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
User-private information retrieval based on a peer-to-peer community
Data & Knowledge Engineering
A Framework for Computing the Privacy Scores of Users in Online Social Networks
ICDM '09 Proceedings of the 2009 Ninth IEEE International Conference on Data Mining
The Functionality-Security-Privacy Game
MDAI '09 Proceedings of the 6th International Conference on Modeling Decisions for Artificial Intelligence
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Fully anonymous group signatures without random oracles
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Rational privacy disclosure in social networks
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Rational enforcement of digital oblivion
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Exploiting social networks to provide privacy in personalized web search
Journal of Systems and Software
Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search
Information Sciences: an International Journal
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
On the complexity of aggregating information for authentication and profiling
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
Hi-index | 0.00 |
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in preserving his privacy. Coprivacy makes an individual's privacy preservation a goal that rationally interests other individuals: it is a matter of helping oneself by helping someone else. We formally define coprivacy in terms of Nash equilibria. We then extend the concept to: i) general coprivacy, where a helping player's utility (i.e. interest) may include earning functionality and security in addition to privacy; ii) mixed coprivacy, where mixed strategies and mixed Nash equilibria are allowed with some restrictions; iii) correlated coprivacy, in which Nash equilibria are replaced by correlated equilibria. Coprivacy can be applied to any peer-to-peer (P2P) protocol. We illustrate coprivacy in P2P user-private information retrieval, and also in content privacy in on-line social networking.