Realistic Threats to Self-Enforcing Privacy

被引:2
作者
Bella, Giampaolo [1 ]
Librizzi, Francesco [1 ]
Riccobene, Salvatore [1 ]
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95125 Catania, Italy
来源
FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS | 2008年
关键词
network privacy; electronic polling; threat model;
D O I
10.1109/IAS.2008.23
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A recent privacy protocol for secure e-polls aims at ensuring the submitting individuals that the pollster will preserve the privacy of their submitted preferences. Otherwise the individuals can indict the pollster provided that the pollster participates actively in this phase. The analysis of the protocol in a realistic threat model denounces that a malicious pollster that abuses the private preferences by disclosure will arguably not help out during its own indictment. Therefore, the protocol ensures insufficient fairness among their participants because it gives the pollster some advantage over the individuals. Two variant protocols are introduced and analysed in the same threat model - one is found to move the advantage over the individuals, the other is found to achieve a satisfactory level of fairness.
引用
收藏
页码:155 / 160
页数:6
相关论文
共 11 条
[1]  
[Anonymous], NETWORK SIMULATOR NS
[2]  
Bella G., 2005, P NAT ADV RES WORKSH
[3]  
Cramer R., 2000, ACM Transactions on Information and Systems Security, V3, P161, DOI 10.1145/357830.357847
[4]  
Dwork C., 2006, THEORY CRYPTOGRAPHY
[5]  
DWORK C, 2006, ICALP 2006
[6]  
FUJISAKI E, 2001, ADV CRYPTOLOGY
[7]  
GOLLE P, 2006, P 13 ACM C COMP COMM
[8]  
KALISKI B, RSA CRYPTOGRAPHY SPE
[9]  
LAU F, 2000, IEEE INT C SYST MAN
[10]  
MAURER U, 1996, ESORICS EUR S RES CO