Abstract
The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address the privacy concerns of the communication partners. Our data retention protocols store streams of encrypted data items, some of which may be flagged as critical (representing misbehavior). The frequent occurrence of critical data items justifies the self-decryption of all recently stored data items, critical or not. Our first protocol allows the party gathering the retained data to decrypt all data items collected within, say, the last half year whenever the number of critical data items reaches some threshold within, say, the last month. The protocol ensures that the senders of data remain anonymous but may reveal that different critical data items came from the same sender. Our second, computationally more complex scheme obscures this affiliation of critical data with high probability.
Original language | English |
---|---|
Title of host publication | 6th International Conference on Theory and Applications of Models of Computation (TAMC 2009) |
Volume | 5532 |
Publisher | Springer Berlin Heidelberg |
Publication date | 2009 |
Pages | 251-260 |
Publication status | Published - 2009 |