QUT ePrints

Conditional Privacy Using Re-encryption

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.

View at publisher

Abstract

This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system. Firstly, a secure protocol to distribute a re-encryption key from a user A to a service provider B, with the help of n referees, is proposed. Next, this re-encryption key distribution protocol is combined with an existing private credential system to provide a protocol for conditional revocation of private information. This protocol has a strong accountability property with efficient online performance. It does not assume the existence of a single trusted entity. We tolerate up to t dishonest referees (t ≤ n − 1), while A and B are dishonest and do not trust each other.

Impact and interest:

1 citations in Scopus
Search Google Scholar™
0 citations in Web of Science®

Citation countsare sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

124 since deposited on 03 Feb 2009
44 in the past twelve months

Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 17342
Item Type: Conference Paper
Keywords: privacy, private credential, re-encryption
DOI: 10.1109/NPC.2008.37
ISBN: 9780769533544
Divisions: Past > Institutes > Information Security Institute
Copyright Owner: Copyright 2008 IEEE
Copyright Statement: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Deposited On: 04 Feb 2009 09:42
Last Modified: 29 Feb 2012 23:45

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page