Abstract
The topmost concern of users who are kept under surveillance by a CCTV-System is the loss of their privacy. To gain a high acceptance by the monitored users, we have to assure, that the recorded video-material is only available to a subset of authorized users under exactly previously defined circumstances. In this paper we propose a CCTV video surveillance system providing privacy in a distributed way using threshold multi-party computation. Due to the flexibility of the access structure, we can handle the problem of loosing private-key-shares that are necessary for reconstructing video-material as well as adding new users to the system. If a pre-defined threshold is reached, a shared update of the master secret and the according re-encryption of previously stored ciphertext without revealing the plaintext is provided.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Advanced Encryption Standard (AES). FIPS-Pub 197, NIST (2001)
Boyle, M., Edwards, C., Greenberg, S.: The Effects on Filtered Video on Awareness and Privacy. In: CSCW 2000: Proceed. of the 2000 ACM conference on Computer supported cooperative work, Philadephia, PA, USA, pp. 1–10 (2000)
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
Gennaro, R., et al.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295–310. Springer, Heidelberg (1999)
Goldreich, O., et al.: How to play any mental game – a completeness theorem for protocols with honest majority. In: Proc. 19th ACM STOC, pp. 218–229 (1987)
Herzberg, A., et al.: Proactive secret sharing or: how to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Hirt, M.: Multi-Party Computation: Efficient Protocols, General Adversaries, and Voting. Ph.D. thesis, ETH Zurich, 2001 Reprint as vol. 3 of ETH Series in Information Security and Cryptography, Hartung-Gorre Verlag, Konstanz (2001)
Collins, R.T., et al.: A System for Video Surveillance and Monitoring. In: Proceedings of the American Nuclear Society (ANS) Eighth International Topical Meeting on Robotics and Remote Systems (1999)
Newton, E., Sweeney, L., Malin, B.: Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering 17(2), 232–243 (2005)
Pedersen, T.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Pieprzyka, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Heidelberg (2003)
Schaffer, M.: Managing Key-Shares in Distributed Public-Key Cryptosystems. Technical Report TR-syssec-05-04, University of Klagenfurt, Austria (August. 2005)
Schaffer, M.: Tree-shared Generation of a Secret Value. Technical Report TR-syssec-05-01, University of Klagenfurt, Austria (June 2005)
Schaffer, M., Schartner, P.: Hierarchical Key Escrow with Passive Adversaries. Technical Report TR-syssec-05-02, University of Klagenfurt, Austria (June 2005)
Senior, A., et al.: Blinkering Surveillance: Enabling Video Privacy through Computer Vision. IBM Research Report RC22886 (W0308-109), August 28 (2003)
Shamir, A.: How to share a secret. Comm. of the ACM 11, 612–613 (1979)
Yao, A.C.: Protocols for secure computation. In: Proceed. of the 23rd IEEE Symposium on Foundations of Computer Security (1982)
Zhou, L., et al.: Distributed Blinding for ElGamal Re-encryption. In: Proceed. 25th IEEE Int. Conf. on Distributed Computing Systems, Ohio, June 2005, pp. 815–824 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Schaffer, M., Schartner, P. (2005). Video Surveillance: A Distributed Approach to Protect Privacy. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds) Communications and Multimedia Security. CMS 2005. Lecture Notes in Computer Science, vol 3677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552055_14
Download citation
DOI: https://doi.org/10.1007/11552055_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28791-9
Online ISBN: 978-3-540-31978-8
eBook Packages: Computer ScienceComputer Science (R0)