Loading...
conference paper not in proceedings
Privacy-Preserving Lawful Contact Chaining
October 24, 2016
How can government agencies acquire actionable, useful information about legitimate targets, while preserving the privacy of innocent parties and holding government agencies accountable? Towards understanding this crucial issue, we present the first privacy-preserving protocol for contact chaining, an operation that law-enforcement and intelligence agencies have used effectively. Our experiments suggest that a three-hop, privacy-preserving graph traversal producing 27,000 ciphertexts can be done in under two minutes.
Loading...
Name
wpes16-chaining.pdf
Type
postprint
Access type
openaccess
License Condition
CC BY-NC-ND
Size
253.45 KB
Format
Adobe PDF
Checksum (MD5)
de67f31f35ed7b39f7de9348f8013f18