A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
[chapter]
2011
Lecture Notes in Computer Science
The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share only the requested information. This poses two challenges: (1) how to enable this type of sharing such that parties learn no information
doi:10.1007/978-3-642-21599-5_18
fatcat:txwzp4t66nflxjxnyb2qrcuefy