Skip to main content

Anonymous Statistical Survey of Attributes

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

A distributor of digital contents desires to collect users’ attributes. This is because the distributor can grasp the image of users, and work out the marketing strategy. On the other hand, the users do not desire to offer the attributes owing to the privacy protection. For anonymous surveys, a protocol to generate statistical results of the attributes is previously proposed, where the extra information is not released beyond the statistical results. However, in the simple application of this protocol to the surveys, the correctness of the statistical results is not assured, since the users do not necessarily offer the correct attributes. In this paper, under the assumption that some trusted third parties exist, an anonymous statistical survey system of attributes with the correctness is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sako, K.: Generating Statistical Information in Anonymous Surveys, IEICE trans. on Fundamentals., Vol. E79-A, No. 4, pp. 507–512 (1996).

    Google Scholar 

  2. Camenisch, J. and Stadler, M.: Efficient Group Signature Schemes for Large Groups, Advances in Cryptology — CRYPTO’97, LNCS 1294, Springer-Verlag, pp. 410–424 (1997).

    Chapter  Google Scholar 

  3. Abe, M.: Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix-centers, Advances in Cryptology — EUROCRYPT’98, LNCS 1403, Springer-Verlag, pp. 437–447 (1998).

    Chapter  Google Scholar 

  4. Desmedt, Y. and Frankel, Y.: Threshold Cryptosystems, Advances in Cryptology — CRYPTO’89, LNCS 435, Springer-Verlag, pp. 307–315 (1990).

    Google Scholar 

  5. Fiat, A. and Shamir, A.: How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology — CRYPTO’ 86, LNCS 263, Springer-Verlag, pp. 186–194 (1987).

    Google Scholar 

  6. Bellare, M. and Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, Proc. of First Annual Conference on Computer and Communications Security, Association for Computing Machinery, pp. 62–73 (1993).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nakanishi, T., Sugiyama, Y. (2001). Anonymous Statistical Survey of Attributes. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_36

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_36

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics