Multi-application smart cards and encrypted data processing
Future Generation Computer Systems - Special issue on smart cards
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Asymmetric Public Detection Watermarking Technique
IH '99 Proceedings of the Third International Workshop on Information Hiding
Anonymous Fingerprinting Based on Committed Oblivious Transfer
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A Robust Asymmetric Watermarking Scheme Using Multiple Public Watermarks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Algorithmic Game Theory
An Efficient Anonymous Fingerprinting Protocol
Computational Intelligence and Security
A Robust Public-key Image Watermarking Scheme Based on Weakness Signal Detection Using Chaos System
CW '08 Proceedings of the 2008 International Conference on Cyberworlds
Digital Watermarking and Steganography
Digital Watermarking and Steganography
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Delete: The Virtue of Forgetting in the Digital Age
Delete: The Virtue of Forgetting in the Digital Age
Coprivacy: towards a theory of sustainable privacy
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
An asymmetric watermarking method
IEEE Transactions on Signal Processing
Hi-index | 0.00 |
Digital storage in the information society allows perfect and unlimited remembering. Yet, the right of an individual to enforce oblivion for pieces of information about her is part of her fundamental right to privacy. We propose a solution to digital forgetting based on anonymously fingerprinting expiration dates. In our solution, people who learn information about an individual are rationally interested in helping the individual enforce her oblivion policy. Thanks to this rational involvement, even services for content spreading like Facebook or YouTube would be interested in fingerprinting downloads, thereby effectively enforcing the right of content owners to canceling content.