Abstract
It is commonly acknowledged that customers’ privacy in electronic commerce should be well protected. The solutions may come not only from the ethics education and legislation, but also from cryptographic technologies. In this paper we propose and analyze a privacy protection scheme for e-commerce of digital goods. The scheme takes cryptography as its technical means to realize privacy protection for online customers. It is efficient in both computational cost and communication cost. It is very practical for real e-commerce systems compared with previous solutions. The cryptographic technique presented in this paper is rather simple. But the scheme has great application potential in reality. We give careful security analysis to the scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
B. Chor, O. Goldreich, E. Kushilevita, and M. Sudan, “Private Information Retrieval”, Proc. Of 36th FOCS, pp. 41–50, 1995.
B. Chor and N. G ilboa, “Computational Private Information Retrieval“, Proc. Of 29th STOC, pp. 304–313, 1997.
E. Kushilevita and R. Ostrovsky, “Singal-database Computationally Private Information Retrieval”, Proc. Of 38th FOCS, 1997.
Y. Gertner, Y. Ishai, E. Kushilevita and T. Malkin, “Protecting Data Privacy in Private Information Retrieval Schemes”, Proc. of 30th STOC, 1998.
C. Cachin, S. Micali, and M. S tadler, “Computationally Private Information Retrieval with Polylogrithmic Communication”, in Proceedings of Eurocrypt’99, LNCS, Springer-Verlag, pp. 402–414, 1999.
D. Chaum, A. Fiat, and M. Naor, “Untraceable electronic cash”, in Proceedings of Crypto’88, LNCS, Springer-Verlag, pp. 319–327, 1990.
A. Underwood, “Professional Ethics in a Security and Privacy Context-the Perspective of a National Computing Society”, in Proceedings of ACISP’2000, LNCS 1841, Springer-Verlag, pp. 477–486, 2000.
Zero-Knowledge System Inc., http://www.zeroknowledge.com/
oron, D. Naccache and J. Stern, “On the security of RSA padding”, Crypto’99, pp. 1–18, Springer-Verlag, 1999.
M. Bellare and P. Rogaway, “Optimal asymmetric encryption”, Eurocrypt’94, LNCS, Springer-Verlag, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bao, F., Deng, R.H., Feng, P. (2001). An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_13
Download citation
DOI: https://doi.org/10.1007/3-540-45247-8_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41782-8
Online ISBN: 978-3-540-45247-8
eBook Packages: Springer Book Archive