Conditional Privacy Using Re-encryption
Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.
This paper proposes, for the first time, the use of re-encryption scheme to improve users privacy in a privacy-enhancing system. Firstly, a secure protocol to distribute a re-encryption key from a user A to a service provider B, with the help of n referees, is proposed. Next, this re-encryption key distribution protocol is combined with an existing private credential system to provide a protocol for conditional revocation of private information. This protocol has a strong accountability property with efficient online performance. It does not assume the existence of a single trusted entity. We tolerate up to t dishonest referees (t ≤ n − 1), while A and B are dishonest and do not trust each other.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Conference Paper|
|Keywords:||privacy, private credential, re-encryption|
|Divisions:||Past > Institutes > Information Security Institute|
|Copyright Owner:||Copyright 2008 IEEE|
|Copyright Statement:||Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Deposited On:||03 Feb 2009 23:42|
|Last Modified:||29 Feb 2012 13:45|
Repository Staff Only: item control page