Title
Privacy preserving electronic surveillance
Abstract
Can protocols make privacy concerns no longer clash with security imperatives, by satisfying both? The former seems to preclude the widespread collection and sharing of data about individuals and their activities, whereas the latter (especially national security and law enforcement) seems to require it. This paper gives a step in the direction of satisfying both, by giving protocols that make the data-sharing about individuals and their actions conditional on these individuals being already on a list of known suspects, deadbeats, criminals, etc. More formally, if we call U the set of all identities, S the subset of U for which monitoring is authorized, Alice the monitoring agency (that alone knows S), Bob any of the data-collection entities, p ε U the identity whose activity Bob has just observed, then the outcome of the protocol is that Alice learns the activity of p if and only if p ε S, and Bob does not learn anything about the membership of p in S.
Year
DOI
Venue
2003
10.1145/1005140.1005148
WPES
Keywords
Field
DocType
electronic surveillance,data-collection entity,monitoring agency,known suspect,privacy concern,national security,longer clash,security imperative,activity bob,law enforcement,widespread collection,privacy,security protocols,satisfiability,data collection,security protocol
National security,Internet privacy,Cryptographic protocol,Computer science,Computer security,Electronic surveillance,If and only if,Law enforcement
Conference
ISBN
Citations 
PageRank 
1-58113-776-1
7
0.75
References 
Authors
11
2
Name
Order
Citations
PageRank
Keith B. Frikken170839.35
Mikhail J. Atallah23828340.54