Research Commons
      • Browse 
        • Communities & Collections
        • Titles
        • Authors
        • By Issue Date
        • Subjects
        • Types
        • Series
      • Help 
        • About
        • Collection Policy
        • OA Mandate Guidelines
        • Guidelines FAQ
        • Contact Us
      • My Account 
        • Sign In
        • Register
      View Item 
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      •   Research Commons
      • University of Waikato Research
      • Computing and Mathematical Sciences
      • Computing and Mathematical Sciences Papers
      • View Item
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

      Will, Mark Antony; Ko, Ryan K.L.; Schlickmann, Silvino J.
      Thumbnail
      Files
      MarkWill_paper1_082017.pdf
      Accepted version, 235.2Kb
      DOI
       10.1109/Trustcom/BigDataSE/ICESS.2017.347
      Find in your library  
      Citation
      Export citation
      Will, M. A., Ko, R. K. L., & Schlickmann, S. J. (2017). Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. In Proceedings of 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 1024–1031). Washington, DC, USA: IEEE. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.347
      Permanent Research Commons link: https://hdl.handle.net/10289/11872
      Abstract
      Promoting data sharing between organisations is challenging, without the added concerns over having actions traced. Even with encrypted search capabilities, the entities digital location and downloaded information can be traced, leaking information to the hosting organisation. This is a problem for law enforcement and government agencies, where any information leakage is not acceptable, especially for investigations. Anonymous routing is a technique to stop a host learning which agency is accessing information. Many related works for anonymous routing have been proposed, but are designed for Internet traffic, and are over complicated for internal usage. A streaming design for circuit creation is proposed using elliptic curve cryptography. Allowing for a simple anonymous routing solution, which provides fast performance with source and destination anonymity to other organisations.
      Date
      2017
      Type
      Conference Contribution
      Publisher
      IEEE
      Rights
      © 2017 IEEE. This is the author's accepted version. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
      Collections
      • Computing and Mathematical Sciences Papers [1455]
      Show full item record  

      Usage

      Downloads, last 12 months
      84
       
       
       

      Usage Statistics

      For this itemFor all of Research Commons

      The University of Waikato - Te Whare Wānanga o WaikatoFeedback and RequestsCopyright and Legal Statement