DocumentCode
586723
Title
Scheme overcoming incompatibility of privacy and utilization of personal data
Author
Tsujii, S. ; Tadaki, K. ; Fujita, Ryo ; Yamaguchi, Hitoshi ; Gotaishi, Masahito ; Tsunoo, Yukiyasu ; Syouji, T. ; Doi, Nobukazu
Author_Institution
R&D Initiative, Chuo Univ., Tokyo, Japan
fYear
2012
fDate
28-31 Oct. 2012
Firstpage
727
Lastpage
730
Abstract
In the near future, continuing technical progress in computer science will allow the transformation of current visions of pervasive utilization on personal data into real world options. However, this perspective has raised deep concerns about the survival of privacy, as central building blocks of pervasive utilization on personal data which are in direct conflict with the fundamentals of privacy protection. Considerable efforts have been undertaken to cope with these concerns with limited conditions such as computational complexity and communication complexity. We highlight the principal incompatibility of privacy and pervasive utilization on personal data and propose a scheme under the existence of the trusted third party.
Keywords
communication complexity; data privacy; trusted computing; communication complexity; computational complexity; data privacy protection; personal data pervasive utilization incompatibility; personal data privacy utilization incompatibility; trusted third party; Data privacy; Electronic government; Electronic mail; Encryption; Protocols; Silicon;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory and its Applications (ISITA), 2012 International Symposium on
Conference_Location
Honolulu, HI
Print_ISBN
978-1-4673-2521-9
Type
conf
Filename
6401037
Link To Document