Private Information: To Reveal or not to Reveal

被引:9
作者
Yao, Danfeng [1 ]
Frikken, Keith B. [2 ]
Atallah, Mikhail J. [3 ]
Tamassia, Roberto [4 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Piscataway, NJ 08854 USA
[2] Miami Univ, Dept Comp Sci & Syst Anal, Oxford, OH 45056 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[4] Brown Univ, Dept Comp Sci, Providence, RI 02912 USA
关键词
Security; Algorithms; authorization; policies; secure multi-party computation;
D O I
10.1145/1410234.1410240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points before granting Alice access to a resource. In turn, Alice values each of her credentials with a privacy score that indicates her degree of reluctance to reveal that credential. Bob's valuation of credentials and his threshold are private. Alice's privacy-valuation of her credentials is also private. Alice wants to find a subset of her credentials that achieves Bob's required threshold for access, yet is of as small a value to her as possible. We give protocols for computing such a subset of Alice's credentials without revealing any of the two parties' above-mentioned private information. Furthermore, we develop a fingerprint method that allows Alice to independently and easily recover the optimal knapsack solution, once the computed optimal value is given, but also enables verification of the integrity of the optimal value. The fingerprint method is useful beyond the specific authorization problem studied, and can be applied to any integer knapsack dynamic programming in a private setting.
引用
收藏
页数:27
相关论文
共 52 条
  • [11] Bonatti P. A., 2002, Journal of Computer Security, V10, P241
  • [12] BONEH D, 2001, LNCS, V2139
  • [13] BRADSHAW R, 2004, P 11 ACM C COMP COMM
  • [14] Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
  • [15] Camenisch J., 2002, Proceedings of the 9th ACM conference on Computer and communications security, P21, DOI 10.1145/586110.586114
  • [16] Camp LJ, 2004, ADV INF SEC, V12, P17
  • [17] Security and composition of multiparty cryptographic protocols
    Canetti, R
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202
  • [18] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
  • [19] CHEN W, 2005, P 24 ANN JOINT C IEE, V2, P1431
  • [20] COCKS C, 2001, 8 IMA INT C CRYPT CO, V2260, P360