Targeted Advertising ... And Privacy Too

作者: Ari Juels

DOI: 10.1007/3-540-45353-9_30

关键词: Computer securityInformation privacyBulletin boardPrivate information retrievalCryptographyThe InternetComputer scienceInternet privacyConsumer privacyTargeted advertising

摘要: The Web presents a rich and powerful tool for aggregation of consumer information. A flurry recent articles in the popular press has documented aggressive manipulation such information by some companies purposes targeted advertising. While advertisers tout economic social benefits advertising, privacy groups have expressed grave concerns about its potential abuses, called legislative policies to protect sensitive data. In this paper, we explore notion that advertising protection need not necessarily be conflicting goals. We describe conceptually simple technical schemes facilitate but also offer Some proposals do even require use cryptography. (As an example, mention existing scheme commercial deployment.) consider more sophisticated protocols offering greater assurance privacy. These involve cryptographic constructions may thought as partial, practical PIR (private retrieval) schemes.

参考文章(37)
Smith R, Goldman J, Hudson Z, Privacy: report on the privacy policies and practices of health web sites. Professional ethics report : newsletter of the American Association for the Advancement of Science, Committee on Scientific Freedom & Responsibility, Professional Society Ethics Group. ,vol. 13, ,(2000)
Jan Camenisch, Markus Michels, Proving in zero-knowledge that a number is the product of two safe primes theory and application of cryptographic techniques. pp. 107- 122 ,(1999) , 10.1007/3-540-48910-X_8
Miyako Ohkubo, Masayuki Abe, A Length-invariant Hybrid Mix IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 84, pp. 931- 940 ,(2001)
Markus Jakobsson, Ari Juels, Mix and Match: Secure Function Evaluation via Ciphertexts international conference on the theory and application of cryptology and information security. pp. 162- 177 ,(2000) , 10.1007/3-540-44448-3_13
Markus Jakobsson, On Quorum Controlled Asymmetric Proxy Re-encryption public key cryptography. pp. 112- 121 ,(1999) , 10.1007/3-540-49162-7_9
Yael Gertner, Shafi Goldwasser, Tal Malkin, A Random Server Model for Private Information Retrieval randomization and approximation techniques in computer science. pp. 200- 217 ,(1998) , 10.1007/3-540-49543-6_17
Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani, Fault tolerant anonymous channel international conference on information and communication security. pp. 440- 444 ,(1997) , 10.1007/BFB0028500
Yael Gertner, Shafi Goldwasser, Tal Malkin, A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication randomization and approximation techniques in computer science. pp. 200- 217 ,(1998)
Yvo Desmedt, Kaoru Kurosawa, How to break a practical MIX and design a new one theory and application of cryptographic techniques. pp. 557- 572 ,(2000) , 10.1007/3-540-45539-6_39
Masayuki Abe, Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers theory and application of cryptographic techniques. ,vol. 83, pp. 437- 447 ,(1998) , 10.1007/BFB0054144