Advertisement

Enforcing Privacy by Withholding Private Information

  • Frans Lategan
  • Martin S. Olivier
Conference paper
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 47)

Abstract

Privacy of information is becoming more and more important as we start trusting unknown computers, servers and organisations with more and more of our personal information. Thus far, no reliable and practical method to enforce privacy has been discovered. Often a set of private information has to be supplied simply to enable the recipient to verify that one member of the set is correct given the other methods. An income tax return is an example where such information has to be supplied simply to verify taxable income. The object of this paper is to consider mechanisms to safeguard our private information in cases where this information is required not for the contents, but as input to verify calculations. We shall present an encryption method to protect private information where the private information consists of a set of numeric values S on which some function G has to be applied and the result α = G(S) has to be supplied to a target organisation. The result α must be verifiable by the target organisation, without disclosing S. We apply this method to the specific case of protecting the privacy of electronic income tax returns, and discuss other possible applications.

Keywords

Taxable Income Private Information Information Security Encryption Function Vote Counter 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    J. Canavan, “Information Privacy: It’s Your Business”, Telecommunications, November 1998, 38.Google Scholar
  2. [2]
    C. J. Dorobek, “Gore proposes an Electronic Bill of Rights to protect the privacy of personal data.”, Government Computer News, August 24, 1998 v17 n27, 16.Google Scholar
  3. [3]
    J. L. Guerra, W. Jackson, C. J. Dorobek and F. Olsen, “Clinton signs privacy order (President Clinton signs executive order to ensure that new technology does not erode privacy of US citizens)”, Government Computer News, June 15, 1998 v17 n17, 3.Google Scholar
  4. [4]
    H. Wang, M. K. O. Lee and C. Wang, “Consumer privacy concerns about Internet marketing.”, Communications of the ACM, March 1998, 63–70.Google Scholar
  5. [5]
    B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson and M. Olivier, “Security and Privacy Issues for the World Wide Web: Panel Discussion”, Database Security XII: Status and Prospects,Kluwer, To Appear.Google Scholar
  6. [6]
    C. Pounder, “An Initial Plan of Action for Compliance with the UK’s Data Protection Act 1998”, Computers 000 Security, February 1999, 23–27.Google Scholar
  7. [7]
    L. F. Cranor, “Internet Privacy”, Communications of the ACM, February 1999, 29–31.Google Scholar
  8. [8]
    W. Madsen, “IRS Fails to Provide Adequate Security, Privacy Controls”, Computer Fraud 000 Security, February 1999, 8.Google Scholar
  9. [9]
    K. Q. Nguyen, V. Varadharajan and Y. Mu, “Batching Proofs of Knowledge and its Applications”, DEXA99 International Workshop on Electronic Commerce and Security, Florence, September 1999.Google Scholar
  10. [10]
    EU, USA make little progress with data protection“, Computer Fraud 000 Security, February 1999, 3.Google Scholar
  11. [11]
    J. Seberry and J. Pieprzyk, “Cryptography: An Introduction to Computer Security”, Prentice Hall, 1989.zbMATHGoogle Scholar
  12. [12]
    D. Naccache and J. Stern, “A New Public Key Cryptosystem Based on Higher Residues.”, Proceedings of the 5th ACM conference on Computer and Communications Security, 1998, 59–66.Google Scholar
  13. [13]
    N. Ahituv, Y. Lapid and S. Neumann, “Processing Encrypted Data.”, Communications of the ACM, September 1987, 777–780.Google Scholar
  14. [14]
    R. Clarke, “Internet Privacy Concerns Confirm the Case for Intervention.”, Communications of the ACM, February 1999, 60–67.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2000

Authors and Affiliations

  • Frans Lategan
    • 1
  • Martin S. Olivier
    • 1
  1. 1.Department of Computer ScienceRand Afrikaans UniversitySouth Africa

Personalised recommendations