2005
DOI: 10.1541/ieejeiss.125.1767
|View full text |Cite
|
Sign up to set email alerts
|

Information Sharing among Untrustworthy Entities

Abstract: Most of current technologies that enable secure information sharing assume that entities that share information are mutually trustworthy. However, in recent applications this assumption is not realistic. As applications become sophisticated, information systems are required to share information securely even among untrustworthy entities. This paper discusses two kinds of problems about information sharing among untrustworthy entities, i.e. secure statistical data gathering and anonymous authentication, and pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2006
2006
2009
2009

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 4 publications
0
5
0
1
Order By: Relevance
“…O can complain that M issues its token S M (T n ) also to P while giving a copy of S M (T n ) to P. Therefore O should show its unique number T n while encrypting it into E O (T n ). Here, O can generate number T n that is unique in the system by picking it from the unique number-list prepared by M. Of course O should pick numbers anonymously through the anonymous authentication mechanism, for an example, through a mechanism proposed in [9], and to force O to pick numbers only from the unique number-list, M must signs on numbers in the list while using a secret key different from K M .…”
Section: Dmentioning
confidence: 99%
“…O can complain that M issues its token S M (T n ) also to P while giving a copy of S M (T n ) to P. Therefore O should show its unique number T n while encrypting it into E O (T n ). Here, O can generate number T n that is unique in the system by picking it from the unique number-list prepared by M. Of course O should pick numbers anonymously through the anonymous authentication mechanism, for an example, through a mechanism proposed in [9], and to force O to pick numbers only from the unique number-list, M must signs on numbers in the list while using a secret key different from K M .…”
Section: Dmentioning
confidence: 99%
“…This process is executed anonymously and securely by using an anonymous authentication mechanism (9) . Namely, a client C, which requests transaction execution, sends a list D of clients' IDs that includes C's own ID.…”
Section: Step1 Client Authenticationmentioning
confidence: 99%
“…The server applies the secure statistical data gathering mechanism (9) to the additively veiled form calculation, i.e. the server calculates a set of mutually independent linear combinations of the above five parts by using coefficients, which are secret from clients.…”
Section: Step3 Transaction Executionmentioning
confidence: 99%
See 2 more Smart Citations