Title :
Scheme overcoming incompatibility of privacy and utilization of personal data
Author :
Tsujii, S. ; Tadaki, K. ; Fujita, Ryo ; Yamaguchi, Hitoshi ; Gotaishi, Masahito ; Tsunoo, Yukiyasu ; Syouji, T. ; Doi, Nobukazu
Author_Institution :
R&D Initiative, Chuo Univ., Tokyo, Japan
Abstract :
In the near future, continuing technical progress in computer science will allow the transformation of current visions of pervasive utilization on personal data into real world options. However, this perspective has raised deep concerns about the survival of privacy, as central building blocks of pervasive utilization on personal data which are in direct conflict with the fundamentals of privacy protection. Considerable efforts have been undertaken to cope with these concerns with limited conditions such as computational complexity and communication complexity. We highlight the principal incompatibility of privacy and pervasive utilization on personal data and propose a scheme under the existence of the trusted third party.
Keywords :
communication complexity; data privacy; trusted computing; communication complexity; computational complexity; data privacy protection; personal data pervasive utilization incompatibility; personal data privacy utilization incompatibility; trusted third party; Data privacy; Electronic government; Electronic mail; Encryption; Protocols; Silicon;
Conference_Titel :
Information Theory and its Applications (ISITA), 2012 International Symposium on
Conference_Location :
Honolulu, HI
Print_ISBN :
978-1-4673-2521-9