Personalized Privacy Protection in Big Data by Youyang Qu & Mohammad Reza Nosouhi & Lei Cui & Shui Yu

Personalized Privacy Protection in Big Data by Youyang Qu & Mohammad Reza Nosouhi & Lei Cui & Shui Yu

Author:Youyang Qu & Mohammad Reza Nosouhi & Lei Cui & Shui Yu
Language: eng
Format: epub
ISBN: 9789811637506
Publisher: Springer Singapore


4.3.2.1 DC-Net Overview

DC-net [83] is a distributed and non-interactive protocol proposed to provide anonymous communications for a group of users who wish to anonymously publish their messages in the group. Its title comes from the example by which Chaum explained his proposed protocol (Fig. 4.15).

Fig. 4.15The dining cryptographers network in a simple example

Three cryptographers sit around a table in a restaurant to have dinner. They are informed by a waiter that someone has anonymously paid their bill. The payer can be one of them or the bill might have been paid by the NSA (National Security Agency). They respect each other’s right to make an anonymous payment, but they are curious to see if NSA has paid the bill. Thus, they perform the following protocol.

For all pairs, two cryptographers share a secret bit by tossing an unbiased coin behind their menu such that only those two cryptographers see the result. Thus, cryptographer A, for example, has two secret bits and that have been shared with cryptographer B and C, respectively. Then, if a cryptographer has paid the bill, he XORs his shared keys with bit 1. Otherwise, the XOR operation is performed with bit 0. In both cases, each cryptographer announces his result. If the three published results are XORed together, the result bit is 0 if NSA has paid their bill. If one of the cryptographers has paid the bill, the result is 1.

This basic protocol has been extended to multiple users in [95]. Let’s consider N users who wish to anonymously publish some L-bit messages . Assume that each pair of users shares an L-bit key in a set-up phase where for . Moreover, in this phase, every user computes the following XORed Keys (XK) vector:



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Cybersecurity: The Beginner's Guide by Dr. Erdal Ozkaya(1671)
Digital Forensics and Incident Response - Second Edition by Gerard Johansen(1472)
Network Security Strategies by Aditya Mukherjee(1371)
Modern Cryptography for Cybersecurity Professionals by Lisa Bock(1342)
Practical Cybersecurity Architecture by Diana Kelley Ed Moyle(1331)
Web Penetration Testing with Kali Linux - Third Edition by Gilberto Nájera-Gutiérrez(786)
Web Application Obfuscation by Mario Heiderich & Eduardo Alberto Vela Nava & Gareth Heyes & David Lindsay(587)
Cybersecurity - Attack and Defense Strategies by Erdal Ozkaya & Yuri Diogenes(581)
GCIH GIAC Certified Incident Handler All-in-One Exam Guide by Nick Mitropoulos(472)
Kali Linux Penetration Testing Bible by Gus Khawaja(428)
Cybercrime Investigations by John Bandler(412)
The Hardware Hacking Handbook by Colin O'Flynn(394)
Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre(361)
Kali Linux: Testing Your Network: How to Test Infrastructure Security with Security Testing and Penetration Testing by Eltrinos Frank(354)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks by Purackal Rachel Sebastian(326)
Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies(324)
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites by Rob Kowalski(320)
8 Steps to Better Security by Crawley Kim;(312)
Security, Privacy and User Interaction by Unknown(287)
Cybersecurity: A Self-Teaching Introduction by C.P. Gupta & K.K. Goyal(281)