{"title":"A scheme for collecting anonymous data","authors":"S. Tamura, S. Taniguchi","doi":"10.1109/ICIT.2013.6505846","DOIUrl":null,"url":null,"abstract":"This paper proposes a scheme for calculating aggregate values of data owned by anonymous entities. Linear mix-nets, an unknown unique number generator, and anonymous tag based credentials efficiently conceal not only identities of data owners but also linkages between data owned by same entities. Then, the scheme enables quick introduction of advancing information technologies to industrial applications while ensuring confidentiality of sensitive data, e.g. a machine maintenance company can monitor states of machines remotely without knowing secrets of machine owners, companies can outsource even their sensitive tasks without worrying about leaks of their secrets. The scheme is also applicable to tasks in e-governance systems such as tax-collections where privacies of individuals must be preserved.","PeriodicalId":192784,"journal":{"name":"2013 IEEE International Conference on Industrial Technology (ICIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference on Industrial Technology (ICIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIT.2013.6505846","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper proposes a scheme for calculating aggregate values of data owned by anonymous entities. Linear mix-nets, an unknown unique number generator, and anonymous tag based credentials efficiently conceal not only identities of data owners but also linkages between data owned by same entities. Then, the scheme enables quick introduction of advancing information technologies to industrial applications while ensuring confidentiality of sensitive data, e.g. a machine maintenance company can monitor states of machines remotely without knowing secrets of machine owners, companies can outsource even their sensitive tasks without worrying about leaks of their secrets. The scheme is also applicable to tasks in e-governance systems such as tax-collections where privacies of individuals must be preserved.