The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes

Dwight Home, S. Nair
{"title":"The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes","authors":"Dwight Home, S. Nair","doi":"10.1109/CCST.2016.7815691","DOIUrl":null,"url":null,"abstract":"In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"11 1","pages":"1-8"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2016.7815691","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

In this paper we present the Prom Problem (TPP) which exemplifies a special class of matchmaking challenges. We introduce the notion of identity linked wishes - wishes that involve specific identities and are valid if and only if all involved parties have that wish. A number of protocols over the years have highlighted the conflicting goals of anonymity and authentication in attempting to match users with common wishes. More recent works have built upon past attempts proposing solutions for private and privacy-enhanced matchmaking with additional security goals. Yet those protocols are insufficient in the context of TPP due primarily to the lack of fairness and inability to ensure security and privacy. We describe TPP in detail, compare with prior work, and propose a fair and privacy-enhanced matchmaking protocol supporting identity linked wishes with an untrusted matchmaker. In practical terms, our technology can prevent much of the potential damage from data breaches similar to the recent Ashley Madison hack which has allegedly resulted in blackmail, ruined careers, espionage, and even suicide. We give a pseudo-code example of our solution along with its security and preliminary performance evaluation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
舞会问题:公平和隐私增强配对与身份相关的愿望
在本文中,我们提出了舞会问题(TPP),它是一类特殊的配对挑战的例子。我们引入了身份关联愿望的概念,即涉及特定身份的愿望,当且仅当所有相关方都有这种愿望时才有效。多年来,许多协议都强调了匿名和身份验证的冲突目标,试图将用户与共同的愿望相匹配。最近的工作建立在过去的尝试之上,提出了带有额外安全目标的私人和增强隐私的配对解决方案。然而,这些协议在TPP的背景下是不够的,主要原因是缺乏公平性,无法确保安全和隐私。我们详细描述了TPP,与之前的工作进行了比较,并提出了一个公平和隐私增强的配对协议,支持与不受信任的媒人进行身份链接的愿望。实际上,我们的技术可以防止数据泄露带来的潜在损害,比如最近阿什利·麦迪逊(Ashley Madison)被黑客入侵,据称该事件导致了勒索、毁了职业、间谍活动,甚至自杀。我们给出了我们的解决方案的伪代码示例,以及它的安全性和初步性能评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
AI facial recognition and biometric detection: balancing consumer rights and corporate interests Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools MIMO Cable Guided Radar Assessing the common authorship of a set of questioned signature images A fuzzy interval valued fusion technique for multi-modal 3D face recognition
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1