Schutz der Anonymität als Gemeinschaftsaufgabe - eine neue Generation von PETs?

Technologies, der seine rechtstheoretische Motivation aus einem Verstandnis der Privatsphare als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in eine theoretisches Risiko ein, um gegenseitig ihre Anonymitat und damit einen wesentlichen Aspekt ihrer Privatsphare zu sichern.

[1]  William J Buchanan,et al.  Privacy-preserving data acquisition protocol , 2010, 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON).

[2]  Charles D. Raab Privacy, Social Values and the Public Interest , 2012 .

[3]  Rafail Ostrovsky,et al.  A Survey of Single Database PIR: Techniques and Applications , 2007, IACR Cryptol. ePrint Arch..

[4]  Robert H. Deng,et al.  Privacy Protection for Transactions of Digital Goods , 2001, ICICS.

[5]  P E Fine,et al.  Herd immunity: history, theory, practice. , 1993, Epidemiologic reviews.

[6]  Adi Shamir,et al.  On the Power of Commutativity in Cryptography , 1980, ICALP.

[7]  Spiros Simitis,et al.  Reviewing Privacy In an Information Society , 1987 .

[8]  Yehuda Lindell,et al.  Secure Computation without Agreement , 2002, DISC.

[9]  Mikhail J. Atallah,et al.  Privacy preserving electronic surveillance , 2003, WPES '03.

[10]  M. Weitzman The Share Economy , 1984 .

[11]  Shweta Bansal,et al.  Network frailty and the geometry of herd immunity , 2006, Proceedings of the Royal Society B: Biological Sciences.

[12]  Peter Swire,et al.  Security and privacy after September 11: the health care example , 2002, CFP '02.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  Yuval Ishai,et al.  Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.

[15]  Edward J. Bloustein,et al.  Privacy as an Aspect of Human Dignity : An Answer to Dean Prosser , 1984 .

[16]  Alexandre V. Evfimievski,et al.  Information sharing across private databases , 2003, SIGMOD '03.

[17]  Young B. Choi,et al.  Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules , 2006, Journal of Medical Systems.

[18]  Stephen A. Weis New foundations for efficient authentication, commutative cryptography, and private disjointness testing , 2006 .

[19]  Wenliang Du,et al.  Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[20]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[21]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[22]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[23]  William J Buchanan,et al.  Validation of 1-N OT algorithms in privacy-preserving investigations. , 2008 .

[24]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .