First page Back Continue Last page Overview Graphics
Context: Theory of variable privacy
Theory of security allows binary choice for data revelation:
- Bob is trusted/untrusted
- If he is trusted, data is revealed to him using a perfect protocol
Information leakage necessary for a number of interactions
- Even the revelation of a sum using ZK protocols leaks information about the variables; this information is valuable to Bob and Alice
Randomization can be used for personal privacy, in a “privacy market”
Notes: