STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Computationally private information retrieval (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Protecting data privacy in private information retrieval schemes
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Universal service-providers for database private information retrieval (extended abstract)
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Improved upper bounds on information-theoretic private information retrieval (extended abstract)
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Computationally private information retrieval with polylogarithmic communication
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Filtering for private collaborative benchmarking
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Real-time privacy-preserving moving object detection in the cloud
Proceedings of the 21st ACM international conference on Multimedia
Hi-index | 0.00 |
Can protocols make privacy concerns no longer clash with security imperatives, by satisfying both? The former seems to preclude the widespread collection and sharing of data about individuals and their activities, whereas the latter (especially national security and law enforcement) seems to require it. This paper gives a step in the direction of satisfying both, by giving protocols that make the data-sharing about individuals and their actions conditional on these individuals being already on a list of known suspects, deadbeats, criminals, etc. More formally, if we call U the set of all identities, S the subset of U for which monitoring is authorized, Alice the monitoring agency (that alone knows S), Bob any of the data-collection entities, p ε U the identity whose activity Bob has just observed, then the outcome of the protocol is that Alice learns the activity of p if and only if p ε S, and Bob does not learn anything about the membership of p in S.