首页 > 最新文献

Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society最新文献

英文 中文
Self-monitoring of web-based information disclosure 网络信息披露的自我监控
K. Abdullah, G. Conti, E. Sobiesk
Free online tools such as search, email and mapping come with a cost. Web users obtain such services by making micropayments of personal and organizational information to the web service providers. Web companies use this information to create customized advertising and tailored user experiences. Individually, each transaction appears innocuous, but when aggregated, the result is often highly sensitive. The impact of AOL.s inadvertent disclosure of 20 million nominally anonymized search queries underscores the pressing need for increasing web privacy and raising user awareness of the problem. Rather than advocate extreme legal and policy measures to address the dilemma, this paper proposes an equitable self-monitoring solution. Self-monitoring allows individual users and large enterprises to regulate their web-based interactions intelligently and still allow online companies to innovate and flourish. The primary contributions of our work includes exploration of visualization techniques that support self-monitoring, a human-centric evaluation and the results of a user requirements survey.
免费的在线工具,如搜索、电子邮件和地图,都需要付费。网络用户通过向网络服务提供商支付个人和组织信息的小额费用来获得此类服务。网络公司利用这些信息来制作定制广告和定制用户体验。单独来看,每个事务似乎都是无害的,但汇总起来,结果往往是高度敏感的。美国在线的影响。美国在无意中泄露了2000万个名义上匿名的搜索查询,这凸显了加强网络隐私和提高用户对这一问题意识的迫切需要。本文提出了一种公平的自我监督解决方案,而不是主张采取极端的法律和政策措施来解决这一困境。自我监控允许个人用户和大型企业智能地管理他们在网络上的互动,同时也允许在线公司创新和蓬勃发展。我们工作的主要贡献包括探索支持自我监控的可视化技术、以人为中心的评估和用户需求调查的结果。
{"title":"Self-monitoring of web-based information disclosure","authors":"K. Abdullah, G. Conti, E. Sobiesk","doi":"10.1145/1314333.1314343","DOIUrl":"https://doi.org/10.1145/1314333.1314343","url":null,"abstract":"Free online tools such as search, email and mapping come with a cost. Web users obtain such services by making micropayments of personal and organizational information to the web service providers. Web companies use this information to create customized advertising and tailored user experiences. Individually, each transaction appears innocuous, but when aggregated, the result is often highly sensitive. The impact of AOL.s inadvertent disclosure of 20 million nominally anonymized search queries underscores the pressing need for increasing web privacy and raising user awareness of the problem. Rather than advocate extreme legal and policy measures to address the dilemma, this paper proposes an equitable self-monitoring solution. Self-monitoring allows individual users and large enterprises to regulate their web-based interactions intelligently and still allow online companies to innovate and flourish. The primary contributions of our work includes exploration of visualization techniques that support self-monitoring, a human-centric evaluation and the results of a user requirements survey.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"64 1","pages":"56-59"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91032391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Private web search 私人网页搜索
Felipe Saint-Jean, Aaron Johnson, D. Boneh, J. Feigenbaum
Web search is currently a source of growing concern about personal privacy. It is an essential and central part of most users' activity online and therefore one through which a significant amount of personal information may be revealed.To help users protect their privacy, we have designed and implemented Private WebSearch (PWS), a usable client-side tool that minimizes the information that users reveal to a search engine. Our tool protects users against attacks that involve active components and timing information, to which more general Web-browsing privacy tools (including the combination of FoxTor and Privoxy) are vulnerable. PWS is a Firefox plugin that functions as an HTTP proxy and as a client for the Tor anonymity network. It configures Firefox so that search queries executed from the PWS search box are routed through the HTTP proxy and Tor client, filtering potentially sensitive or identifying components of the request and response.
目前,网络搜索成为人们日益关注个人隐私的一个原因。它是大多数用户在线活动的基本和核心部分,因此可能会泄露大量个人信息。为了帮助用户保护他们的隐私,我们设计并实现了Private WebSearch (PWS),这是一个可用的客户端工具,可以最大限度地减少用户向搜索引擎透露的信息。我们的工具保护用户免受涉及活动组件和定时信息的攻击,而更一般的网络浏览隐私工具(包括FoxTor和privvoxy的组合)容易受到攻击。PWS是一个Firefox插件,可以作为HTTP代理和Tor匿名网络的客户端。它配置Firefox,以便从PWS搜索框执行的搜索查询通过HTTP代理和Tor客户端路由,过滤潜在的敏感或识别请求和响应的组件。
{"title":"Private web search","authors":"Felipe Saint-Jean, Aaron Johnson, D. Boneh, J. Feigenbaum","doi":"10.1145/1314333.1314351","DOIUrl":"https://doi.org/10.1145/1314333.1314351","url":null,"abstract":"Web search is currently a source of growing concern about personal privacy. It is an essential and central part of most users' activity online and therefore one through which a significant amount of personal information may be revealed.To help users protect their privacy, we have designed and implemented Private WebSearch (PWS), a usable client-side tool that minimizes the information that users reveal to a search engine. Our tool protects users against attacks that involve active components and timing information, to which more general Web-browsing privacy tools (including the combination of FoxTor and Privoxy) are vulnerable. PWS is a Firefox plugin that functions as an HTTP proxy and as a client for the Tor anonymity network. It configures Firefox so that search queries executed from the PWS search box are routed through the HTTP proxy and Tor client, filtering potentially sensitive or identifying components of the request and response.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"4 1","pages":"84-90"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84948234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Information carrying identity proof trees 携带身份证明树的信息
W. Winsborough, A. Squicciarini, E. Bertino
In open systems, the verification of properties of subjects is crucial for authorization purposes. Very often access to resources is based on policies that express (possibly complex) requirements in terms of what are referred to variously as identity properties, attributes, or characteristics of the subject. In this paper we provide an approach that an entity called a verifier can use to evaluate queries about properties of a subject requesting resources that are relevent deciding whether the requested action is authorized. Specifically, we contribute techniques that enable reuse of previously computed query results. We consider issues related to temporal validity as well as issues related to confidentiality when one entity reuses query results computed by another entity. We employ constraint logic programming as the foundation of our policy rules and query evaluation. This provides a very general, flexible basis, and enable our work to be applied more or less directly to several existing policy frameworks. The process of evaluation of a query against a subject identity is traced through a structure, referred to as identity proof tree, that carries all information proving that a policy requirement is met.
在开放系统中,主体属性的验证对于授权目的至关重要。通常情况下,对资源的访问是基于策略的,这些策略根据不同的主题的标识属性、属性或特征来表达(可能是复杂的)需求。在本文中,我们提供了一种方法,称为验证者的实体可以使用该方法来评估有关请求资源的主题属性的查询,这些属性与所请求的操作是否被授权相关。具体来说,我们提供了能够重用先前计算的查询结果的技术。当一个实体重用由另一个实体计算的查询结果时,我们考虑与时间有效性相关的问题以及与机密性相关的问题。我们使用约束逻辑编程作为策略规则和查询评估的基础。这提供了一个非常通用的、灵活的基础,并使我们的工作或多或少能够直接应用于几个现有的政策框架。对主题标识进行查询的评估过程通过一个结构进行跟踪,该结构称为身份证明树,它携带证明策略需求得到满足的所有信息。
{"title":"Information carrying identity proof trees","authors":"W. Winsborough, A. Squicciarini, E. Bertino","doi":"10.1145/1314333.1314348","DOIUrl":"https://doi.org/10.1145/1314333.1314348","url":null,"abstract":"In open systems, the verification of properties of subjects is crucial for authorization purposes. Very often access to resources is based on policies that express (possibly complex) requirements in terms of what are referred to variously as identity properties, attributes, or characteristics of the subject. In this paper we provide an approach that an entity called a verifier can use to evaluate queries about properties of a subject requesting resources that are relevent deciding whether the requested action is authorized. Specifically, we contribute techniques that enable reuse of previously computed query results. We consider issues related to temporal validity as well as issues related to confidentiality when one entity reuses query results computed by another entity. We employ constraint logic programming as the foundation of our policy rules and query evaluation. This provides a very general, flexible basis, and enable our work to be applied more or less directly to several existing policy frameworks. The process of evaluation of a query against a subject identity is traced through a structure, referred to as identity proof tree, that carries all information proving that a policy requirement is met.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"24 1","pages":"76-79"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77995131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distance-preserving pseudonymization for timestamps and spatial data 时间戳和空间数据的距离保留假名化
F. Kerschbaum
The need for privacy in intrusion detection data, such as audit logs is widely recognized. The prevalent method for privacy protection in audit logs is pseudonymization (and suppression). There is a clear trade-off between the privacy of a pseudonymization technique and its utility for intrusion detection. E.g., for IP addresses a method for prefix preserving pseudonymization has been developed, that allows pseudonymized IP addresses to be still grouped into subnets. This paper describes a pseudonymization technique for timestamps that is distance preserving. I.e. given two pseudonymized timestamps one can compute the distance δ, if d is below or equal to an agreed threshold d and one cannot compute δif δ = 2d. We extend our technique for two dimensional spatial data, e.g. location of objects or persons. We also evaluate the privacy any such distance-preserving technique can provide for timestamps theoretically and on real-world log data.
入侵检测数据(如审计日志)对隐私的需求已得到广泛认可。审计日志中常用的隐私保护方法是假名化(和抑制)。在假名技术的隐私性和入侵检测的实用性之间存在明显的权衡。例如,对于IP地址,已经开发了一种保留前缀的假名化方法,允许假名化的IP地址仍然分组到子网中。本文描述了一种保持距离的时间戳假名化技术。例如,给定两个假名时间戳,如果d低于或等于商定的阈值d,则可以计算距离δ,如果δ = 2d则无法计算δ。我们将技术扩展到二维空间数据,例如物体或人的位置。我们还评估了任何这种距离保持技术在理论上和实际日志数据上为时间戳提供的隐私性。
{"title":"Distance-preserving pseudonymization for timestamps and spatial data","authors":"F. Kerschbaum","doi":"10.1145/1314333.1314346","DOIUrl":"https://doi.org/10.1145/1314333.1314346","url":null,"abstract":"The need for privacy in intrusion detection data, such as audit logs is widely recognized. The prevalent method for privacy protection in audit logs is pseudonymization (and suppression). There is a clear trade-off between the privacy of a pseudonymization technique and its utility for intrusion detection. E.g., for IP addresses a method for prefix preserving pseudonymization has been developed, that allows pseudonymized IP addresses to be still grouped into subnets. This paper describes a pseudonymization technique for timestamps that is distance preserving. I.e. given two pseudonymized timestamps one can compute the distance δ, if d is below or equal to an agreed threshold d and one cannot compute δif δ = 2d. We extend our technique for two dimensional spatial data, e.g. location of objects or persons. We also evaluate the privacy any such distance-preserving technique can provide for timestamps theoretically and on real-world log data.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"5 1","pages":"68-71"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85416009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Disappearing for a while - using white lies in pervasive computing 消失一段时间——在普适计算中使用善意的谎言
Susana Alcalde Bagüés, A. Zeidler, C. Fernández-Valdivielso, I. Matías
The pervasive nature of future living environments, saturated with sensors and context-detecting services, pose a completely new challenge for computer science: the art of virtual disappearance. In many situations individuals do not want to be tracked by the environment and do not want their where abouts to be known publicly or even by their friends and relatives. Today's technology often allowsus to use white lies in such circumstances. The question we pose in this paper is: Can we achieve the same using pervasive computing technologies? In this paper we show how our User-centric Privacy Framework can be extended to allow users to pro-actively use white lies as a means to disguise their location or activity without sacrificing the use of context-services as a whole. As a result we are confident that also in the future we can perform some magic:disappearing for a while - when needed.
未来生活环境无处不在,充斥着传感器和情境检测服务,这对计算机科学提出了一个全新的挑战:虚拟消失的艺术。在许多情况下,个人不希望被环境跟踪,也不希望他们的行踪被公开,甚至被他们的朋友和亲戚知道。如今的科技往往允许我们在这种情况下使用善意的谎言。我们在本文中提出的问题是:我们可以使用普适计算技术实现同样的目标吗?在本文中,我们展示了如何扩展我们的以用户为中心的隐私框架,以允许用户主动使用善意的谎言作为掩饰其位置或活动的手段,而不会牺牲上下文服务作为一个整体的使用。因此,我们有信心,在未来,我们也可以施展一些魔法:在需要的时候消失一段时间。
{"title":"Disappearing for a while - using white lies in pervasive computing","authors":"Susana Alcalde Bagüés, A. Zeidler, C. Fernández-Valdivielso, I. Matías","doi":"10.1145/1314333.1314349","DOIUrl":"https://doi.org/10.1145/1314333.1314349","url":null,"abstract":"The pervasive nature of future living environments, saturated with sensors and context-detecting services, pose a completely new challenge for computer science: the art of virtual disappearance. In many situations individuals do not want to be tracked by the environment and do not want their where abouts to be known publicly or even by their friends and relatives. Today's technology often allowsus to use white lies in such circumstances. The question we pose in this paper is: Can we achieve the same using pervasive computing technologies? In this paper we show how our User-centric Privacy Framework can be extended to allow users to pro-actively use white lies as a means to disguise their location or activity without sacrificing the use of context-services as a whole. As a result we are confident that also in the future we can perform some magic:disappearing for a while - when needed.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"90 1","pages":"80-83"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78970246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Enhancing privacy in identity management systems 加强身份管理系统的私隐
Steven Gevers, K. Verslype, B. Decker
User-privacy in existing identity management systems (IMS) can be improved.Indeed, private credential systems offer privacy enhancing capabilities not yet included in current IMS; e.g. proving claims such as age > 18, with age an attribute. This paper introduces privacy enhanced claim URIs which enable to request personal data in a privacy friendly way. We show how many private credential capabilities can be achieved in current IMS without using private credentials and continue by showing how these URIs allow integration of private credential systems in Microsoft Cardspace. Since our approach is very simple and widely applicable, it allows to enhance privacy friendliness of today's online transactions.
现有身份管理系统(IMS)中的用户隐私可以得到改进。实际上,私有凭证系统提供了当前IMS中尚未包含的隐私增强功能;例如,证明诸如年龄bbbb18这样的声明,年龄是一个属性。本文介绍了隐私增强的索赔uri,它可以以一种隐私友好的方式请求个人数据。我们将展示在不使用私有凭据的情况下,在当前IMS中可以实现多少私有凭据功能,并继续展示这些uri如何允许在Microsoft Cardspace中集成私有凭据系统。由于我们的方法非常简单和广泛适用,它可以提高当今网上交易的隐私友好性。
{"title":"Enhancing privacy in identity management systems","authors":"Steven Gevers, K. Verslype, B. Decker","doi":"10.1145/1314333.1314344","DOIUrl":"https://doi.org/10.1145/1314333.1314344","url":null,"abstract":"User-privacy in existing identity management systems (IMS) can be improved.Indeed, private credential systems offer privacy enhancing capabilities not yet included in current IMS; e.g. proving claims such as age > 18, with age an attribute. This paper introduces privacy enhanced claim URIs which enable to request personal data in a privacy friendly way. We show how many private credential capabilities can be achieved in current IMS without using private credentials and continue by showing how these URIs allow integration of private credential systems in Microsoft Cardspace. Since our approach is very simple and widely applicable, it allows to enhance privacy friendliness of today's online transactions.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"151 1","pages":"60-63"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81669924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improved user authentication in off-the-record messaging 改进了非记录消息传递中的用户身份验证
Chris Alexander, I. Goldberg
Instant Messaging software is now used in homes and businesses by a wide variety of people. Many of these users would benefit from additional privacy, but do not have enough specialized knowledge to use existing privacy-enhancing software. There is a need for privacy software to be easy to understand, with complicated cryptographic concepts hidden from the user. We look at improving the usability of Off-the-Record Messaging, a popular privacy plugin for instant messaging software. By using a solution to the Socialist Millionaires' Problem, we are able to provide the same level of privacy and authentication as in older versions of OTR, but we no longer require that the user understand any difficult concepts such as keys or fingerprints.
即时通讯软件现在被各种各样的人用于家庭和企业。这些用户中的许多人将受益于额外的隐私,但没有足够的专业知识来使用现有的隐私增强软件。隐私软件需要易于理解,对用户隐藏复杂的加密概念。我们着眼于提高非正式消息的可用性,这是一个流行的即时通讯软件隐私插件。通过使用社会主义百万富翁问题的解决方案,我们能够提供与旧版本的OTR相同级别的隐私和身份验证,但我们不再要求用户理解任何困难的概念,如密钥或指纹。
{"title":"Improved user authentication in off-the-record messaging","authors":"Chris Alexander, I. Goldberg","doi":"10.1145/1314333.1314340","DOIUrl":"https://doi.org/10.1145/1314333.1314340","url":null,"abstract":"Instant Messaging software is now used in homes and businesses by a wide variety of people. Many of these users would benefit from additional privacy, but do not have enough specialized knowledge to use existing privacy-enhancing software. There is a need for privacy software to be easy to understand, with complicated cryptographic concepts hidden from the user. We look at improving the usability of Off-the-Record Messaging, a popular privacy plugin for instant messaging software. By using a solution to the Socialist Millionaires' Problem, we are able to provide the same level of privacy and authentication as in older versions of OTR, but we no longer require that the user understand any difficult concepts such as keys or fingerprints.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"57 1","pages":"41-47"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84449698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Towards understanding user perceptions of authentication technologies 了解用户对身份验证技术的看法
Laurie A. Jones, A. Antón, J. Earp
Digital identities are increasingly being used to facilitate the execution of transactions in various domains. When developing and analyzing digital identity technologies, it is important to consider the perceptions and responses of end users. Users are typically concerned about privacy and security, but do not necessarily understand how these issues are impacted by the use of digital identities. In this paper, we discuss preliminary results of a survey regarding authentication technologies used to generate digital identities. Most respondents were unfamiliar with a majority of the technologies in question (e.g. hand geometry scans), and expressed uncertainty about their use. Perceptions were more positive for the use of authentication technologies in the financial domain, and more negative for their use in the retail domain. The results may inform the design of future systems.
数字身份越来越多地被用于促进各个领域的交易执行。在开发和分析数字身份技术时,重要的是要考虑最终用户的看法和反应。用户通常关心隐私和安全,但不一定了解使用数字身份对这些问题的影响。在本文中,我们讨论了一项关于用于生成数字身份的认证技术的调查的初步结果。大多数受访者不熟悉所讨论的大多数技术(例如手部几何扫描),并对其使用表示不确定。对金融领域使用身份验证技术的看法更为积极,而对其在零售领域的使用则更为消极。研究结果可以为未来系统的设计提供参考。
{"title":"Towards understanding user perceptions of authentication technologies","authors":"Laurie A. Jones, A. Antón, J. Earp","doi":"10.1145/1314333.1314352","DOIUrl":"https://doi.org/10.1145/1314333.1314352","url":null,"abstract":"Digital identities are increasingly being used to facilitate the execution of transactions in various domains. When developing and analyzing digital identity technologies, it is important to consider the perceptions and responses of end users. Users are typically concerned about privacy and security, but do not necessarily understand how these issues are impacted by the use of digital identities. In this paper, we discuss preliminary results of a survey regarding authentication technologies used to generate digital identities. Most respondents were unfamiliar with a majority of the technologies in question (e.g. hand geometry scans), and expressed uncertainty about their use. Perceptions were more positive for the use of authentication technologies in the financial domain, and more negative for their use in the retail domain. The results may inform the design of future systems.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"9 1","pages":"91-98"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81482287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
Single-bit re-encryption with applications to distributed proof systems 使用分布式证明系统的应用程序进行单比特重新加密
N. Borisov, Kazuhiro Minami
We examine the implementation of the distributed proof system designed by Minami and Kotz [17]. We find that, although a high-level analysis shows that it preserves confidentiality, the implementation of the cryptographic primitives contains a covert channel that can leak information. Moreover, this channel is present with any traditional choice of public key encryption functions. To remedy this problem, we use the Goldwasser-Micali cryptosystem to implement single-bit re-encryption and show how to make it free of covert channels. We then extend the primitive to support commutative encryption as well. Using this primitive, we design a variant of the Minami-Kotz algorithm that not only is free of covert channels, but also has additional proving power over the original design.
我们研究了Minami和Kotz[17]设计的分布式证明系统的实现。我们发现,尽管高级分析表明它保留了机密性,但加密原语的实现包含一个可能泄露信息的隐蔽通道。此外,该通道与任何传统选择的公钥加密功能一起存在。为了解决这个问题,我们使用Goldwasser-Micali密码系统来实现单比特重加密,并展示了如何使其免于隐蔽通道。然后我们扩展原语以支持交换加密。利用这个原语,我们设计了一种Minami-Kotz算法的变体,它不仅没有隐蔽信道,而且比原始设计具有额外的证明能力。
{"title":"Single-bit re-encryption with applications to distributed proof systems","authors":"N. Borisov, Kazuhiro Minami","doi":"10.1145/1314333.1314341","DOIUrl":"https://doi.org/10.1145/1314333.1314341","url":null,"abstract":"We examine the implementation of the distributed proof system designed by Minami and Kotz [17]. We find that, although a high-level analysis shows that it preserves confidentiality, the implementation of the cryptographic primitives contains a covert channel that can leak information. Moreover, this channel is present with any traditional choice of public key encryption functions.\u0000 To remedy this problem, we use the Goldwasser-Micali cryptosystem to implement single-bit re-encryption and show how to make it free of covert channels. We then extend the primitive to support commutative encryption as well. Using this primitive, we design a variant of the Minami-Kotz algorithm that not only is free of covert channels, but also has additional proving power over the original design.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"23 1","pages":"48-55"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79255298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-resource routing attacks against tor 低资源路由攻击
Kevin S. Bauer, Damon McCoy, D. Grunwald, Tadayoshi Kohno, D. Sicker
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low latency service. Low latency is achieved through Torâ s ability to balance the traffic load by optimizing Tor router selection to probabilistically favor routers with highbandwidth capabilities. We investigate how Torâ s routing optimizations impact its ability to provide strong anonymity. Through experiments conducted on PlanetLab, we show the extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources. Further, we demonstrate that entry guards, added to mitigate path disruption attacks, are themselves vulnerable to attack. Finally, we explore solutions to improve Torâ s current routing algorithms and propose alternative routing strategies that prevent some of the routing attacks used in our experiments.
Tor已经成为匿名TCP通信的最流行的覆盖网络之一。它的受欢迎程度部分是由于其强大的匿名特性和相对较低的延迟服务。低延迟是通过优化Tor路由器选择来平衡流量负载的能力来实现的,以概率地支持具有高带宽功能的路由器。我们研究了tor的路由优化如何影响其提供强匿名性的能力。通过在PlanetLab上进行的实验,我们展示了路由性能优化在多大程度上使系统容易受到来自非全局对手的端到端流量分析攻击。此外,我们还证明,为了减轻路径中断攻击而添加的入口守卫本身也容易受到攻击。最后,我们探讨了改进tor当前路由算法的解决方案,并提出了替代路由策略,以防止我们实验中使用的一些路由攻击。
{"title":"Low-resource routing attacks against tor","authors":"Kevin S. Bauer, Damon McCoy, D. Grunwald, Tadayoshi Kohno, D. Sicker","doi":"10.1145/1314333.1314336","DOIUrl":"https://doi.org/10.1145/1314333.1314336","url":null,"abstract":"Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low latency service. Low latency is achieved through Torâ s ability to balance the traffic load by optimizing Tor router selection to probabilistically favor routers with highbandwidth capabilities.\u0000 We investigate how Torâ s routing optimizations impact its ability to provide strong anonymity. Through experiments conducted on PlanetLab, we show the extent to which routing performance optimizations have left the system vulnerable to end-to-end traffic analysis attacks from non-global adversaries with minimal resources. Further, we demonstrate that entry guards, added to mitigate path disruption attacks, are themselves vulnerable to attack. Finally, we explore solutions to improve Torâ s current routing algorithms and propose alternative routing strategies that prevent some of the routing attacks used in our experiments.","PeriodicalId":74537,"journal":{"name":"Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society","volume":"176 1","pages":"11-20"},"PeriodicalIF":0.0,"publicationDate":"2007-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77480494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 363
期刊
Proceedings of the ACM Workshop on Privacy in the Electronic Society. ACM Workshop on Privacy in the Electronic Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1