Title :
An algorithm to compute collusion paths
Author :
Low, Steven H. ; Maxemchuk, Nicholas F.
Author_Institution :
Dept. of Electr. & Electron. Eng., Melbourne Univ., Parkville, Vic., Australia
Abstract :
In earlier work we have formulated a collusion problem that determines whether it is possible for a set of colluders to collectively discover a target set of information, starting from their initial knowledge, and have presented a complete solution for a special case of the problem. In this paper we present an algorithm that solves the general case. Given a collusion problem the algorithm determines whether it has a solution, and if it does, computes one. A solution to the collusion problem is a method with which the colluders can uncover the hidden information. Communications protocols that employ cryptographic techniques are increasingly used to protect privacy as well as to communicate. A cryptographic protocol defines a process by which information is transferred among some users while hidden from others. The algorithm presented can be used to determine whether a subset of protocol users can discover, during or after the protocol´s execution, the information that is designed to be hidden from them
Keywords :
cryptography; data privacy; protocols; algorithm; collusion paths computation; collusion problem solution; communications protocols; cryptographic protocol; cryptographic techniques; data privacy; hidden information; Algorithm design and analysis; Broadband communication; Credit cards; Cryptographic protocols; Cryptography; Data security; Electronic commerce; Mobile communication; Privacy; Protection;
Conference_Titel :
INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution., Proceedings IEEE
Conference_Location :
Kobe
Print_ISBN :
0-8186-7780-5
DOI :
10.1109/INFCOM.1997.644529