Advances in Information and Computer Security
DOI: 10.1007/978-3-540-75651-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Accredited Symmetrically Private Information Retrieval

Abstract: Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this paper, we consider the problem of protecting personal information subjects. More specifically, we propose a new primitive allowing a data subject to decide when, how, and by whom his data can be accessed, without the database manager learning anything about his identity, at the time the data is retrieved. The proposed solution, which we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…Research on this topic received a significant attention in the past (e.g., [1,2,3,4,5,6]). More recently, a partial solution that contributes to reinforcing user's control over their data, has been proposed in [7]. This solution, called accredited symmetrically private information retrieval (ASPIR), assumes a setting where sensitive information belonging to users (data-subjects) is stored on a remote database DB managed by a party called a Sender.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Research on this topic received a significant attention in the past (e.g., [1,2,3,4,5,6]). More recently, a partial solution that contributes to reinforcing user's control over their data, has been proposed in [7]. This solution, called accredited symmetrically private information retrieval (ASPIR), assumes a setting where sensitive information belonging to users (data-subjects) is stored on a remote database DB managed by a party called a Sender.…”
Section: Introductionmentioning
confidence: 99%
“…The setting includes an additional party called a Receiver who retrieves records from the database. The construction in [7], allows a Receiver to retrieve data owned by the user (data-subject), from a database DB managed by the Sender, such that the following three requirements are satisfied: (1) Privacy for the data-subject: the Receiver can retrieve a data record only if he has a valid authorization to do so from the record owner, (2) Privacy for the Receiver: the Sender is convinced that the Receiver's query is authorized by the owner of the target DB record, without learning any information about the content of the query, or the identity of the record owner, and (3) Privacy for the Sender: the Receiver cannot retrieve information about more than one record per query. For example, the Receiver cannot use an authorization from user U to learn information about database records not belonging to U .…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations