...
首页> 外文期刊>ACM transactions on information and system security >Private Information: To Reveal or not to Reveal
【24h】

Private Information: To Reveal or not to Reveal

机译:私人信息:显示或不显示

获取原文
获取原文并翻译 | 示例
           

摘要

This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points before granting Alice access to a resource. In turn, Alice values each of her credentials with a privacy score that indicates her degree of reluctance to reveal that credential. Bob's valuation of credentials and his threshold are private. Alice's privacy-valuation of her credentials is also private. Alice wants to find a subset of her credentials that achieves Bob's required threshold for access, yet is of as small a value to her as possible. We give protocols for computing such a subset of Alice's credentials without revealing any of the two parties' above-mentioned private information. Furthermore, we develop a fingerprint method that allows Alice to independently and easily recover the optimal knapsack solution, once the computed optimal value is given, but also enables verification of the integrity of the optimal value. The fingerprint method is useful beyond the specific authorization problem studied, and can be applied to any integer knapsack dynamic programming in a private setting.
机译:本文研究了用于信任管理的量化策略的概念,并给出了以披露最小化的方式实现量化策略的协议。具体来说,Bob会使用一定数量的点来评估每个凭据,并在授予Alice访问资源之前要求最小的总点阈值。反过来,爱丽丝(Alice)会通过一个隐私分数来评估她的每个凭据,表明她不愿透露该凭据的程度。鲍勃(Bob)的证书评估和门槛是私人的。爱丽丝对其凭据的隐私评估也是私人的。爱丽丝想找到她的凭据的一个子集,该子集可以达到鲍勃的访问要求阈值,但对她来说价值却尽可能小。我们给出了用于计算Alice凭据的子集的协议,而不会透露双方的上述私人信息。此外,我们开发了一种指纹方法,一旦给出了计算出的最佳值,该方法便可以使Alice独立且轻松地恢复最佳背包解决方案,而且还可以验证最佳值的完整性。指纹方法不仅可以研究特定的授权问题,还可以用于私有环境中的任何整数背包动态编程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号