Abstract
Privacy of information is becoming more and more important as we start trusting unknown computers, servers and organisations with more and more of our personal information. Thus far, no reliable and practical method to enforce privacy has been discovered. Often a set of private information has to be supplied simply to enable the recipient to verify that one member of the set is correct given the other methods. An income tax return is an example where such information has to be supplied simply to verify taxable income. The object of this paper is to consider mechanisms to safeguard our private information in cases where this information is required not for the contents, but as input to verify calculations. We shall present an encryption method to protect private information where the private information consists of a set of numeric values S on which some function G has to be applied and the result α = G(S) has to be supplied to a target organisation. The result α must be verifiable by the target organisation, without disclosing S. We apply this method to the specific case of protecting the privacy of electronic income tax returns, and discuss other possible applications.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
References
J. Canavan, “Information Privacy: It’s Your Business”, Telecommunications, November 1998, 38.
C. J. Dorobek, “Gore proposes an Electronic Bill of Rights to protect the privacy of personal data.”, Government Computer News, August 24, 1998 v17 n27, 16.
J. L. Guerra, W. Jackson, C. J. Dorobek and F. Olsen, “Clinton signs privacy order (President Clinton signs executive order to ensure that new technology does not erode privacy of US citizens)”, Government Computer News, June 15, 1998 v17 n17, 3.
H. Wang, M. K. O. Lee and C. Wang, “Consumer privacy concerns about Internet marketing.”, Communications of the ACM, March 1998, 63–70.
B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson and M. Olivier, “Security and Privacy Issues for the World Wide Web: Panel Discussion”, Database Security XII: Status and Prospects,Kluwer, To Appear.
C. Pounder, “An Initial Plan of Action for Compliance with the UK’s Data Protection Act 1998”, Computers 000 Security, February 1999, 23–27.
L. F. Cranor, “Internet Privacy”, Communications of the ACM, February 1999, 29–31.
W. Madsen, “IRS Fails to Provide Adequate Security, Privacy Controls”, Computer Fraud 000 Security, February 1999, 8.
K. Q. Nguyen, V. Varadharajan and Y. Mu, “Batching Proofs of Knowledge and its Applications”, DEXA99 International Workshop on Electronic Commerce and Security, Florence, September 1999.
EU, USA make little progress with data protection“, Computer Fraud 000 Security, February 1999, 3.
J. Seberry and J. Pieprzyk, “Cryptography: An Introduction to Computer Security”, Prentice Hall, 1989.
D. Naccache and J. Stern, “A New Public Key Cryptosystem Based on Higher Residues.”, Proceedings of the 5th ACM conference on Computer and Communications Security, 1998, 59–66.
N. Ahituv, Y. Lapid and S. Neumann, “Processing Encrypted Data.”, Communications of the ACM, September 1987, 777–780.
R. Clarke, “Internet Privacy Concerns Confirm the Case for Intervention.”, Communications of the ACM, February 1999, 60–67.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Lategan, F., Olivier, M.S. (2000). Enforcing Privacy by Withholding Private Information. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_43
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_43
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive