Private Information: To Reveal or not to Reveal

被引:9
作者
Yao, Danfeng [1 ]
Frikken, Keith B. [2 ]
Atallah, Mikhail J. [3 ]
Tamassia, Roberto [4 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Piscataway, NJ 08854 USA
[2] Miami Univ, Dept Comp Sci & Syst Anal, Oxford, OH 45056 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[4] Brown Univ, Dept Comp Sci, Providence, RI 02912 USA
关键词
Security; Algorithms; authorization; policies; secure multi-party computation;
D O I
10.1145/1410234.1410240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points before granting Alice access to a resource. In turn, Alice values each of her credentials with a privacy score that indicates her degree of reluctance to reveal that credential. Bob's valuation of credentials and his threshold are private. Alice's privacy-valuation of her credentials is also private. Alice wants to find a subset of her credentials that achieves Bob's required threshold for access, yet is of as small a value to her as possible. We give protocols for computing such a subset of Alice's credentials without revealing any of the two parties' above-mentioned private information. Furthermore, we develop a fingerprint method that allows Alice to independently and easily recover the optimal knapsack solution, once the computed optimal value is given, but also enables verification of the integrity of the optimal value. The fingerprint method is useful beyond the specific authorization problem studied, and can be applied to any integer knapsack dynamic programming in a private setting.
引用
收藏
页数:27
相关论文
共 52 条
  • [1] AMAGGI A, 2004, P ACM S ACC CONTR MO, P146
  • [2] [Anonymous], P IFIPTM JOINT ITRUS
  • [3] [Anonymous], 2002, SECURE MULTIPA UNPUB
  • [4] Atallah MJ, 2005, LECT NOTES COMPUT SC, V3424, P63
  • [5] Atallah MJ, 2001, LECT NOTES COMPUT SC, V2125, P165
  • [6] On the structure of delegation networks
    Aura, T
    [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 14 - 26
  • [7] AURA T, 1999, LNCS, V1603, P211
  • [8] Enabling SIP-based sessions in ad hoc networks
    Banerjee, Nilanjan
    Acharya, Arup
    Das, Sajal K.
    [J]. WIRELESS NETWORKS, 2007, 13 (04) : 461 - 479
  • [9] Ben-Or Michael, 1988, P 20 ANN ACM S THEOR, P1, DOI DOI 10.1145/62212.62213
  • [10] BETH T, 1994, P 3 EUR S RES COMP S, P3