Revocable Privacy 2011 – use cases
暂无分享,去创建一个
In this document we have described and partially analysed a number of use cases where revocable privacy can help in providing more privacy for the user. We have seen that the use cases can be classified based primarily on the type of rule they encode. We classified threshold based, time based and predicate based rules. In addition we considered decision based rules that involve an explicit decision component and finally a set of complex use cases that combine some of the previous aspects. For future work we believe that there are a couple of interesting directions. First, we have uncovered a couple of use cases that should admit a relatively easy implementation which would make nice demonstrators. Second, some of the use cases employ simple primitives that are ideal targets to really design new cryptographic primitives for. Third, the more complex use cases could really benefit from a more thorough analysis in terms of the exact rules that are necessary and a tight description of the functionality that is desired. Finally, our analysis of the privacy sensitivity should be made more rigorous.
[1] Eric R. Verheul,et al. Pseudonymized Data Sharing , 2010 .
[2] J.M.A. Berkvens,et al. De Wet bescherming persoonsgegevens , 2000 .
[3] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.