A randomized protocol for signing contracts
Communications of the ACM
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
All-or-nothing disclosure of secrets
Proceedings on Advances in cryptology---CRYPTO '86
Communications of the ACM
Protecting data privacy in private information retrieval schemes
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Communications of the ACM
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
Efficient oblivious transfer protocols
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Collaborative filtering with privacy via factor analysis
SIGIR '02 Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval
Hybrid Recommender Systems: Survey and Experiments
User Modeling and User-Adapted Interaction
Equivalence Between Two Flavours of Oblivious Transfers
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Practical Oblivious Transfer Protocols
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
On the Security of ElGamal Based Encryption
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Collaborative Filtering with Privacy
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Agent-mediated electronic commerce: a survey
The Knowledge Engineering Review
ACM SIGACT News - A special issue on cryptography
Impacts of user privacy preferences on personalized systems: a comparative study
Designing personalized user experiences in eCommerce
Blind sales in electronic commerce
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
SVD-based collaborative filtering with privacy
Proceedings of the 2005 ACM symposium on Applied computing
Privacy-preserving demographic filtering
Proceedings of the 2006 ACM symposium on Applied computing
Electronic commerce 2006: a managerial perspective
Electronic commerce 2006: a managerial perspective
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A formal treatment of onion routing
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Hi-index | 0.00 |
We start with the usual paradigm in electronic commerce: a customer, Bob, wants to buy from a merchant, Alice. However, Bob wishes to enjoy maximal privacy while Alice needs to protect her sensitive data. Bob should be able to remain anonymous throughout the entire process, from turning on his computer to final delivery and even after-sale maintenance services. Ideally, he should even be able to hide from Alice what he is interested in buying. Conversely, Alice should not have to reveal anything unnecessary about her catalogue -- especially prices -- for fear that she might in fact be dealing with a hostile competitor masquerading as a customer. For this purpose, we introduce the Blind Electronic Commerce paradigm to offer an integrated solution to the dual conundrum of ensuring Bob's privacy as well as protecting Alice's sensitive information.