• DocumentCode
    586723
  • Title

    Scheme overcoming incompatibility of privacy and utilization of personal data

  • Author

    Tsujii, S. ; Tadaki, K. ; Fujita, Ryo ; Yamaguchi, Hitoshi ; Gotaishi, Masahito ; Tsunoo, Yukiyasu ; Syouji, T. ; Doi, Nobukazu

  • Author_Institution
    R&D Initiative, Chuo Univ., Tokyo, Japan
  • fYear
    2012
  • fDate
    28-31 Oct. 2012
  • Firstpage
    727
  • Lastpage
    730
  • Abstract
    In the near future, continuing technical progress in computer science will allow the transformation of current visions of pervasive utilization on personal data into real world options. However, this perspective has raised deep concerns about the survival of privacy, as central building blocks of pervasive utilization on personal data which are in direct conflict with the fundamentals of privacy protection. Considerable efforts have been undertaken to cope with these concerns with limited conditions such as computational complexity and communication complexity. We highlight the principal incompatibility of privacy and pervasive utilization on personal data and propose a scheme under the existence of the trusted third party.
  • Keywords
    communication complexity; data privacy; trusted computing; communication complexity; computational complexity; data privacy protection; personal data pervasive utilization incompatibility; personal data privacy utilization incompatibility; trusted third party; Data privacy; Electronic government; Electronic mail; Encryption; Protocols; Silicon;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory and its Applications (ISITA), 2012 International Symposium on
  • Conference_Location
    Honolulu, HI
  • Print_ISBN
    978-1-4673-2521-9
  • Type

    conf

  • Filename
    6401037