Privacy Enhancing Technologies

Volume 5672 of the series Lecture Notes in Computer Science pp 164-184

Privacy-Preserving Policy-Based Information Transfer

  • Emiliano De CristofaroAffiliated withComputer Science Department, University of California
  • , Stanislaw JareckiAffiliated withComputer Science Department, University of California
  • , Jihye KimAffiliated withDepartment of Mathematical Sciences, Seoul National University
  • , Gene TsudikAffiliated withComputer Science Department, University of California

* Final gross prices may vary according to local VAT.

Get Access


As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common current scenario involves an authorized party (client) who needs to retrieve sensitive information held by another party (server) such that: (1) the former only gets the information for which it is duly authorized, (2) the latter does not learn what information information is retrieved. To address this scenario, in this paper, we introduce and explore the concept of Privacy-preserving Policy-based Information Transfer (PPIT). We construct three PPIT schemes based, respectively, on: RSA, Schnorr and IBE techniques. We then investigate various performance improvements and demonstrate the practicality of proposed PPIT schemes.