Access controls for oblivious and anonymous systems
نویسندگان
چکیده
منابع مشابه
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary application, we show how to construct privacy-preserving databases by combining oblivious transfer with an augmented anonymous credential system. This permits a database operator to restrict which items each user may a...
متن کاملAnonymous Oblivious Transfer
In this short note we want to introduce anonymous oblivious transfer a new cryptographic primitive which can be proven to be strictly more powerful than oblivious transfer. We show that all functions can be robustly realized by multi party protocols with anonymous oblivious transfer. No assumption about possible collusions of cheaters or disruptors have to be made. Furthermore we shortly discus...
متن کاملGathering Anonymous, Oblivious Robots on a Grid
We consider a swarm of n autonomous mobile robots, distributed on a 2-dimensional grid. A basic task for such a swarm is the gathering process: All robots have to gather at one (not predefined) place. A common local model for extremely simple robots is the following: The robots do not have a common compass, only have a constant viewing radius, are autonomous and indistinguishable, can move at m...
متن کاملAnonymous Fingerprinting Based on Committed Oblivious Transfer
Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as a technique for copyright protection which is compatible with buyer anonymity in electronic transactions. However, the complexity of known algorithms for anonymous fingerprinting deters their practical implementation, since th...
متن کاملAnonymous Biometric Access Control
Access control systems using the latest biometric technologies can offer a higher level of security than conventional passwordbased systems. Their widespread deployments, however, can severely undermine individuals’ rights of privacy. Biometric signals are immutable and can be exploited to associate individuals’ identities to sensitive personal records across disparate databases. In this paper,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Information and System Security
سال: 2011
ISSN: 1094-9224,1557-7406
DOI: 10.1145/1952982.1952992