Point-Based Trust: Define How Much Privacy Is Worth

  • Danfeng Yao
  • Keith B. Frikken
  • Mikhail J. Atallah
  • Roberto Tamassia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4307)

Abstract

This paper studies the notion of point-based policies for trust management, and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points before granting Alice access to a resource. In turn, Alice values each of her credentials with a privacy score that indicates her reluctance to reveal that credential. Bob’s valuation of credentials and his threshold are private. Alice’s privacy-valuation of her credentials is also private. Alice wants to find a subset of her credentials that achieves Bob’s required threshold for access, yet is of as small a value to her as possible. We give protocols for computing such a subset of Alice’s credentials without revealing any of the two parties’ above-mentioned private information.

Keywords

Trust management private multi-party computation knapsack problem 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Atallah, M.J., Li, J.: Secure outsourcing of sequence comparisons. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 63–78. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Ben-Or, M., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: The Twentieth Annual ACM Symposium on Theory of Computing (STOC), pp. 1–10. ACM Press, New York (1988)CrossRefGoogle Scholar
  4. 4.
    Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    Bonatti, P.A., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security 10(3), 241–272 (2002)Google Scholar
  6. 6.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Bradshaw, R., Holt, J., Seamons, K.: Concealing complex policies with hidden credentials. In: Proceedings of 11th ACM Conference on Computer and Communications Security (CCS) (October 2004)Google Scholar
  8. 8.
    Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pp. 21–30 (2002)Google Scholar
  9. 9.
    Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143–202 (2000)MATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985)CrossRefGoogle Scholar
  11. 11.
    Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: The twentieth annual ACM Symposium on Theory of Computing (STOC), pp. 11–19. ACM Press, New York (1988)CrossRefGoogle Scholar
  12. 12.
    Chaum, D., Evertse, J.-H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 118–167. Springer, Heidelberg (1987)Google Scholar
  13. 13.
    Chen, W., Clarke, L., Kurose, J., Towsley, D.: Optimizing cost-sensitive trust-negotiation protocols. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 2, pp. 1431–1442 (2005)Google Scholar
  14. 14.
    Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms. MIT Press, Cambridge (2001)MATHGoogle Scholar
  16. 16.
    Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  17. 17.
    Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: ACM Conference on Computer and Communications Security (CCS 2002), pp. 207–216 (2002)Google Scholar
  18. 18.
    Du., W.: A study of several specific secure two-party computation problems, PhD thesis, Purdue University, West Lafayette, Indiana (2001)Google Scholar
  19. 19.
    Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  20. 20.
    Frikken, K.B., Atallah, M.J.: Privacy preserving route planning. In: Proceedings of the 2004 ACM workshop on Privacy in the Electronic Society (WPES), pp. 8–15. ACM Press, New York (2004)CrossRefGoogle Scholar
  21. 21.
    Frikken, K.B., Atallah, M.J., Li, J.: Hidden access control policies with hidden credentials. In: Proceedings of the 3nd ACM Workshop on Privacy in the Electronic Society (WPES) (October 2004)Google Scholar
  22. 22.
    Frikken, K.B., Li, J., Atallah, M.J.: Trust negotiation with hidden credentials, hidden policies, and policy cycles. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS) (2006)Google Scholar
  23. 23.
    Goldreich, O.: Secure multi-party computation (October 2002) (unpublished manuscript)Google Scholar
  24. 24.
    Goldreich, O.: The Foundations of Cryptography, vol. 2. Cambridge University Press, Cambridge (2004)CrossRefGoogle Scholar
  25. 25.
    Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: The nineteenth annual ACM conference on theory of computing, pp. 218–229. ACM Press, New York (1987)CrossRefGoogle Scholar
  26. 26.
    Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing (STOC), pp. 291–304 (1985)Google Scholar
  27. 27.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys) (2003)Google Scholar
  28. 28.
    Holt, J.E., Bradshaw, R.W., Seamons, K.E., Orman, H.: Hidden credentials. In: Proceedings of the 2nd ACM Workshop on Privacy in the Electronic Society (WPES) (October 2003)Google Scholar
  29. 29.
    Huang, Q., Jao, D., Wang, H.J.: Applications of secure electronic voting to automated privacy-preserving troubleshooting. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS) (November 2005)Google Scholar
  30. 30.
    Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593–599 (2005)Google Scholar
  31. 31.
    Kissner, L., Song, D.: Private and threshold set-intersection. In: CRYPTO 2005 (2005)Google Scholar
  32. 32.
    Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: Proceedings of 12th ACM Conference on Computer and Communications Security (CCS), pp. 46–57 (2005)Google Scholar
  33. 33.
    Lipmaa, H.: Verifiable homomorphic oblivious transfer and private equality test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 416–433. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  34. 34.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)Google Scholar
  35. 35.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  36. 36.
    Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for P2P file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005) - Track 9, p. 302. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  37. 37.
    Winsborough, W.H., Li, N.: Safety in automated trust negotiation. In: Proceedings of IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  38. 38.
    Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, vol. I, pp. 88–102. IEEE Press, Los Alamitos (2000)Google Scholar
  39. 39.
    Yankelovich, N., Walker, W., Roberts, P., Wessler, M., Kaplan, J., Provino, J.: Meeting central: making distributed meetings more effective. In: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW 2004), pp. 419–428. ACM Press, New York (2004)CrossRefGoogle Scholar
  40. 40.
    Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162–167. IEEE Computer Society Press, Los Alamitos (1986)Google Scholar
  41. 41.
    Yao, D., Frikken, K.B., Atallah, M.J., Tamassia, R.: Flexible, secure and private point-based trust management, Technical Report. Brown University (November 2005)Google Scholar
  42. 42.
    Yao, D., Tamassia, R., Proctor, S.: Privacy-preserving computation of trust with application to fuzzy location queries, Brown University Technical Report (March 2006)Google Scholar
  43. 43.
    Yu, T., Ma, X., Winslett, M.: PRUNES: An efficient and complete strategy for automated trust negotiation over the internet. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2000, pp. 210–219 (2000)Google Scholar
  44. 44.
    Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 110–122. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  45. 45.
    Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001), pp. 146–155. ACM Press, New York (2001)CrossRefGoogle Scholar
  46. 46.
    Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Atluri, V., Ning, P., Du, W. (eds.) Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 1–10. ACM, New York (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Danfeng Yao
    • 1
  • Keith B. Frikken
    • 2
  • Mikhail J. Atallah
    • 3
  • Roberto Tamassia
    • 1
  1. 1.Department of Computer ScienceBrown UniversityProvidenceUSA
  2. 2.Department of Computer Science and Systems AnalysisMiami UniversityOxfordUSA
  3. 3.Department of Computer SciencePurdue UniversityWest LafayetteUSA

Personalised recommendations