Protecting the privacy of users in e-commerce environment

被引:0
作者
Chen, CH [1 ]
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 402, Taiwan
来源
INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS | 2004年
关键词
e-commerce; users' privacy protection; private information retrieval (PIR);
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In e-commerce, the protection of users' privacy from a server has not been considered feasible until the private information retrieval (PIR) problem was stated and solved recently. A PIR scheme allows a user to retrieve data items from an online database while hiding the identity of the items from a database server. PIR schemes were studied in depth since the subject was first introduced by Chor et al. in 1995. In this paper, we propose a PIR scheme of one server (OS-PIR) for protecting the privacy of users. It is more practical in real e-commerce environment compared with previous PIR solutions. In addition, we give a security proof to our scheme and comparisons to other PIR schemes.
引用
收藏
页码:63 / 67
页数:5
相关论文
共 8 条
[1]  
Ambainis A, 1997, LECT NOTES COMPUT SC, V1256, P401
[2]   Reducing the servers' computation in private information retrieval: PIR with preprocessing [J].
Beimel, A ;
Ishai, Y ;
Malkin, T .
JOURNAL OF CRYPTOLOGY, 2004, 17 (02) :125-151
[3]  
Beimel A, 2002, ANN IEEE SYMP FOUND, P261, DOI 10.1109/SFCS.2002.1181949
[4]  
Beimel A, 2003, LECT NOTES COMPUT SC, V2576, P326
[5]  
Cachin C, 1999, LECT NOTES COMPUT SC, V1592, P402
[6]  
Chor B, 1995, AN S FDN CO, P41, DOI 10.1109/SFCS.1995.492461
[7]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[8]   Private information retrieval in the presence of malicious failures [J].
Yang, EY ;
Xu, J ;
Bennett, KH .
26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :805-810