Practical Private Data Matching Deterrent to Spoofing Attacks
Conference Proceeding Article
Private data matching between the data sets of two potentially distrusted parties has a wide range of applications. However, existing solutions have substantial weaknesses and do not meet the needs of many practical application scenarios. In particular, practical private data matching applications often require discouraging the matching parties from spoofing their private inputs. In this paper, we address this challenge by forcing the matching parties to "escrow" the data they use for matching to an auditorial agent, and in the "after-the-fact" period, they undertake the liability to attest the genuineness of the escrowed data.
Information Security and Trust
Proceedings of ACM 15th Conference on Information and Knowledge Management, Arlington, November 6-11, 2006
City or Country
YANG, Yanjiang; DENG, Robert H.; and Bao, Feng.
Practical Private Data Matching Deterrent to Spoofing Attacks. (2006). Proceedings of ACM 15th Conference on Information and Knowledge Management, Arlington, November 6-11, 2006. 852-853. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/546