Applications of secure electronic voting to automated privacy-preserving troubleshooting

  • Authors:
  • Qiang Huang;David Jao;Helen J. Wang

  • Affiliations:
  • Princeton University, Princeton, NJ;Microsoft Research;Microsoft Research

  • Venue:
  • Proceedings of the 12th ACM conference on Computer and communications security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. This application poses interesting challenges in preserving privacy of user configuration data and in maintaining integrity of troubleshooting results. In this paper, we provide a much more rigorous cryptographic and yet practical solution for preserving privacy, and we investigate and analyze solutions for ensuring integrity.