Publication Type

Conference Proceeding Article

Version

publishedVersion

Publication Date

9-2006

Abstract

Private data matching between the data sets of two potentially distrusted parties has a wide range of applications. However, existing solutions have substantial weaknesses and do not meet the needs of many practical application scenarios. In particular, practical private data matching applications often require discouraging the matching parties from spoofing their private inputs. In this paper, we address this challenge by forcing the matching parties to "escrow" the data they use for matching to an auditorial agent, and in the "after-the-fact" period, they undertake the liability to attest the genuineness of the escrowed data.

Keywords

data privacy, secure multi-party computation

Discipline

Information Security

Research Areas

Cybersecurity

Publication

CIKM '06: Proceedings of ACM 15th Conference on Information and Knowledge Management, Arlington, November 6-11

First Page

852

Last Page

853

ISBN

9781595934338

Identifier

10.1145/1183614.1183763

Publisher

ACM

City or Country

New York

Copyright Owner and License

Authors

Additional URL

https://doi.org/10.1145/1183614.1183763

Share

COinS