Advertisement

On Crossroads of Privacy Protection

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10726)

Abstract

The privacy protection has recently become a hot topic because of the increase in cyber-crime (using personal data for mounting attacks) as well as legal obligations for parties controlling personal data (eg. GDPR regulation of European Union). This creates a big market for pragmatic technical solutions.

In this paper we discuss a few general issues related to these problems, focused on current challenges and the necessity of paradigm shifting in the construction of IT systems, which should be secure-by-design in a demonstrable way.

References

  1. 1.
    The European Parliament and the Council of the European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ec (General Data Protection Regulation). Off. J. Eur. Union 119 Google Scholar
  2. 2.
    The European Parliament and the Council of the European Union: Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/ec (2014). http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2014.257.01.0073.01.ENG
  3. 3.
    Microsoft: U-Prove. Webpage of the project. Accessed 2017Google Scholar
  4. 4.
    IBM: Idemix. Webpage of the project. Accessed 2017Google Scholar
  5. 5.
    BSI: Technical guideline tr-03110 v2.21 - advanced security mechanisms for machine readable travel documents and eidas token (2016). https://www.bsi.bund.de/EN/Publications/TechnicalGuidelines/TR03110/BSITR03110.html
  6. 6.
    Camenisch, J., Lehmann, A.: (Un)linkable pseudonyms for governmental databases, pp. 1467–1479. [17]Google Scholar
  7. 7.
    Bringer, J., Chabanne, H., Lescuyer, R., Patey, A.: Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 255–272. Springer, Heidelberg (2014)Google Scholar
  8. 8.
    Kluczniak, K.: Anonymous authentication using electronic identity documents. Ph.D. dissertation, Institute of Computer Science, Polish Academy of Sciences (2016)Google Scholar
  9. 9.
    Popoveniuc, S., Kelsey, J., Regenscheid, A., Vora, P.L.: Performance requirements for end-to-end verifiable elections. In: Jones, D.W., Quisquater, J., Rescorla, E. (eds.) 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2010, Washington, D.C., USA, 9–10 August 2010. USENIX Association (2010)Google Scholar
  10. 10.
    Gogolewski, M., Klonowski, M., Kubiak, P., Kutyłowski, M., Lauks, A., Zagórski, F.: Kleptographic attacks on e-voting schemes. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 494–508. Springer, Heidelberg (2006).  https://doi.org/10.1007/11766155_35 CrossRefGoogle Scholar
  11. 11.
    Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes, pp. 364–375. [17]Google Scholar
  12. 12.
    Tang, Q., Yung, M.: Cliptography: post-snowden cryptography. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October–03 November 2017, pp. 2615–2616. ACM (2017)Google Scholar
  13. 13.
    Hanzlik, L., Kluczniak, K., Kutyłowski, M.: Controlled randomness – a defense against backdoors in cryptographic devices. In: Phan, R.C.-W., Yung, M. (eds.) Mycrypt 2016. LNCS, vol. 10311, pp. 215–232. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-61273-7_11 CrossRefGoogle Scholar
  14. 14.
    Hanzlik, L., Kubiak, P., Kutylowski, M.: Tracing attacks on U-prove with revocation mechanism: tracing attacks for U-prove. In: Bao, F., Miller, S., Zhou, J., Ahn, G. (eds.) Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2015, Singapore, 14–17 April 2015, pp. 603–608. ACM (2015)Google Scholar
  15. 15.
    Baldimtsi, F., Camenisch, J., Hanzlik, L., Krenn, S., Lehmann, A., Neven, G.: Recovering lost device-bound credentials. In: Malkin, T., Kolesnikov, V., Lewko, A.B., Polychronakis, M. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 307–327. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-28166-7_15 CrossRefGoogle Scholar
  16. 16.
    ISO/IEC JTC1 SC17 WG3/TF5 for the International Civil Aviation Organization: Supplemental access control for machine readable travel documents. Technical report (2014) version 1.1, April 2014Google Scholar
  17. 17.
    Ray, I., Li, N., Kruegel, C. (eds.): Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–6 October 2015. ACM (2015)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Faculty of Fundamental Problems of TechnologyWrocław University of Science and TechnologyWrocławPoland

Personalised recommendations