Privacy-Preserving Policy-Based Information Transfer

  • Emiliano De Cristofaro
  • Stanislaw Jarecki
  • Jihye Kim
  • Gene Tsudik
Conference paper

DOI: 10.1007/978-3-642-03168-7_10

Volume 5672 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
De Cristofaro E., Jarecki S., Kim J., Tsudik G. (2009) Privacy-Preserving Policy-Based Information Transfer. In: Goldberg I., Atallah M.J. (eds) Privacy Enhancing Technologies. PETS 2009. Lecture Notes in Computer Science, vol 5672. Springer, Berlin, Heidelberg

Abstract

As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common current scenario involves an authorized party (client) who needs to retrieve sensitive information held by another party (server) such that: (1) the former only gets the information for which it is duly authorized, (2) the latter does not learn what information information is retrieved. To address this scenario, in this paper, we introduce and explore the concept of Privacy-preserving Policy-based Information Transfer (PPIT). We construct three PPIT schemes based, respectively, on: RSA, Schnorr and IBE techniques. We then investigate various performance improvements and demonstrate the practicality of proposed PPIT schemes.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Emiliano De Cristofaro
    • 1
  • Stanislaw Jarecki
    • 1
  • Jihye Kim
    • 2
  • Gene Tsudik
    • 1
  1. 1.Computer Science DepartmentUniversity of CaliforniaIrvine
  2. 2.Department of Mathematical SciencesSeoul National University