220,371 Hits in 2.4 sec

Privacy protocols [article]

Jason Castiglione and Dusko Pavlovic and Peter-Michael Seidel
2019 arXiv   pre-print
The blurred boundaries between privacy protocols and privacy attacks present a new challenge for protocol analysis.  ...  Security protocols enable secure communication over insecure channels. Privacy protocols enable private interactions over secure channels.  ...  Local privacy failures: Covert channels Privacy protocol failures A privacy protocol establishes an overt private channel to distribute private resources.  ... 
arXiv:1904.05540v1 fatcat:bnkziky4brbxnmaninb55vilye

Privacy-Preserving Group Matching Protocol

Takuya Ibaraki
2018 Journal of Computers  
Many works have been done for privacy-preserving matching protocols. Most of them obtain one-to-one privacy-preserving matching.  ...  We propose a privacy-preserving group matching protocol. We show computation cost of the proposed protocol and show simulation results.  ...  Most of them assume one-to-one privacy-preserving matching. In this paper, we propose a privacy-preserving matching protocol that forms multiple people as a group.  ... 
doi:10.17706/jcp.13.9.1037-1041 fatcat:wa7giw35nreptiqqgrcxh766rm

Privacy-preserving data acquisition protocol

Zbigniew Kwecka, William J Buchanan, Duncan Spiers
2010 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON)  
In this research a novel approach to investigative data acquisition is presented and privacy preserving Investigative Data Acquisition Protocol (IDAP) is defined.  ...  This protocol is the first that allows for performing private information retrieval of records matching multiple selection criteria.  ...  These is the most useful family of the privacy-preserving data retrieval protocols, finding use in electronic watch-lists of suspects Privacy-Preserving Data Acquisition Protocol Zbigniew Kwecka, Prof.  ... 
doi:10.1109/sibircon.2010.5555325 fatcat:il5u5kvyxfdm3h744fhg6lbsk4

Privacy-Preserving Protocols for Eigenvector Computation [article]

Manas A. Pathak, Bhiksha Raj
2010 arXiv   pre-print
In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints.  ...  We analyze the protocol for correctness, security, and efficiency.  ...  It is required that no party colludes with Trent as this will compromise the privacy of the protocol.  ... 
arXiv:1002.3671v3 fatcat:3r65vz2qibg5pjhroy23iyybsi

Privacy preserving n-party scalar product protocol [article]

Florian van Daalen
2022 arXiv   pre-print
The privacy preserving scalar product protocol, which enables the dot product of vectors without revealing them, is one popular example for its versatility.  ...  In this paper we propose a generalization of the protocol for an arbitrary number of parties, based on an existing two-party method.  ...  [8] discovered certain privacy flaws in some of the earlier mentioned protocols, and suggested an alternative with improved privacy guarantees.  ... 
arXiv:2112.09436v3 fatcat:ofo3ho2nyjbtxjaehineovtuuy

The 5G-AKA Authentication Protocol Privacy [article]

Adrien Koutsos
2019 arXiv   pre-print
We then formally prove that our protocol is sigma-unlinkable. This is a new security notion, which allows for a fine-grained quantification of a protocol privacy.  ...  Next, we modify the 5G-AKA protocol to prevent these attacks, while satisfying the cost and efficiency constraints of the 5G-AKA protocol.  ...  Note that we have a trade-off between efficiency and privacy: the SUPI protocol is more expensive to run, but provides more privacy. B.  ... 
arXiv:1811.06922v2 fatcat:hf2jm4h57vhr3o7dl5wu4u3jum

Composing security protocols: from confidentiality to privacy [article]

Myrto Arapinis, Vincent Cheval, Stéphanie Delaune
2014 arXiv   pre-print
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design.  ...  Our results apply to deal with confidentiality but also privacy-type properties (e.g. anonymity, unlinkability) expressed using a notion of equivalence.  ...  To secure the applications mentioned above and to protect our privacy, some specific cryptographic protocols are deployed.  ... 
arXiv:1407.5444v3 fatcat:eywj67de4vfvvmrb7ojof3yhpy

Multi-Party Protocols, Information Complexity and Privacy [article]

Iordanis Kerenidis, Adi Rosén, Florent Urrutia
2018 arXiv   pre-print
The latter result also establishes that the amount of randomness needed by a private protocol that computes this function is Ω(n).  ...  We introduce a new information theoretic measure that we call Public Information Complexity (PIC), as a tool for the study of multi-party computation protocols, and of quantities such as their communication  ...  If there is a privacy requirement with respect to the coordinator, then if there is a random source shared by all the players (but not the coordinator), privacy is always possible using the protocol of  ... 
arXiv:1606.06872v3 fatcat:vsyle7o5gbgwfhftnnpp32xmgi

Location privacy of distance bounding protocols

Kasper Bonne Rasmussen, Srdjan Čapkun
2008 Proceedings of the 15th ACM conference on Computer and communications security - CCS '08  
We analyze distance bounding protocols in terms of their location privacy and we show that they leak information about the location and distance between communicating partners even to passive attackers  ...  Finally, we propose a location private distance bounding protocol that maintains the properties of existing distance bounding protocols while leaking no information about the distance measured between  ...  provide increased privacy for the prover.  ... 
doi:10.1145/1455770.1455791 dblp:conf/ccs/RasmussenC08 fatcat:yz6rywdonzfkfaltsjjhr2lbjm

Privacy In New Mobile Payment Protocol

Tan Soo Fun, Leau Yu Beng, Rozaini Roslan, Habeeb Saleh Habeeb
2008 Zenodo  
The proposed mobile payment protocol not only minimizes the computational operations and communication passes between the engaging parties, but also achieves a completely privacy protection for the payer  ...  Unfortunately, some issues hampering the widespread acceptance of mobile payment such as accountability properties, privacy protection, limitation of wireless network and mobile device.  ...  COMPARISON ON PRIVACY PROTECTION In this section, the proposed mobile payment protocol is comparing with five existing payment protocols from aspect privacy protection.  ... 
doi:10.5281/zenodo.1080093 fatcat:w7t6xjke4rhj7k5cjc565yxhu4

A New Privacy-Enhanced Matchmaking Protocol

Ji Sun SHIN, Virgil D. GLIGOR
2013 IEICE transactions on communications  
., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decades fail to address important privacy concerns.  ...  We define an adversary model, which captures the key security properties of privacy-enhanced matchmaking, and show that a simple, practical protocol derived by a two-step transformation of a password-based  ...  Protocol Design We design a privacy-enhanced matchmaking protocol in a multi-step modular way.  ... 
doi:10.1587/transcom.e96.b.2049 fatcat:kdslwt2i25guhofquxyzxlyt2u

Protecting privacy with protocol stack virtualization

Janne Lindqvist, Juha-Matti Tapio
2008 Proceedings of the 7th ACM workshop on Privacy in the electronic society - WPES '08  
Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack.  ...  These approaches either require changes to all hosts participating in the communication or do not provide privacy for the whole protocol stack or the system.  ...  of mobility and the protocol stack be more aware of application privacy requirements.  ... 
doi:10.1145/1456403.1456416 dblp:conf/wpes/LindqvistT08 fatcat:m5jtubrjubfxndv7rvfdlr236i

Compromising privacy in precise query protocols

Jonathan L. Dautrich, Chinya V. Ravishankar
2013 Proceedings of the 16th International Conference on Extending Database Technology - EDBT '13  
Privacy and security for outsourced databases are often provided by Precise Query Protocols (PQPs). In a PQP, records are individually encrypted by a client and stored on a server.  ...  We propose equivocation and permutation entropy as privacy metrics, and give experimental results that show PQP privacy to be easily compromised by our attack.  ...  Imprecise Query Protocols Many schemes sacrifice query result set precision in favor of improved privacy.  ... 
doi:10.1145/2452376.2452397 dblp:conf/edbt/DautrichR13 fatcat:h5fwolupuvav5f57ibgdvtoore

New Incremental Privacy-Preserving Clustering Protocols

Saeed Samet, Ali Miri
2013 Lecture Notes on Software Engineering  
In this paper we present two new protocols for incremental privacy-preserving k-means clustering, which is a very popular data mining method, when data is distributed, horizontally or vertically, among  ...  At the end of each protocol, each party, without revealing its own private data, receives the final result of the clustering algorithm.  ...  By using these protocols, parties are able to cluster their streamed data, while preserving their privacy.  ... 
doi:10.7763/lnse.2013.v1.53 fatcat:ydbdgnbw45espgcmfa2qgkqyve

Privacy Preserving Protocols for Eigenvector Computation [chapter]

Manas Pathak, Bhiksha Raj
2011 Lecture Notes in Computer Science  
In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints.  ...  We analyze the protocol for correctness, security, and efficiency.  ...  It is required that no party colludes with Trent as this will compromise the privacy of the protocol.  ... 
doi:10.1007/978-3-642-19896-0_10 fatcat:r7jlgyoufjeinf5tiqbh45vqsi
« Previous Showing results 1 — 15 out of 220,371 results