Security and Privacy Applied Research Lab

Cryptographic Control for Privacy in Data Collection and Processing

Aggelos Kiayias
Department of Computer Science & Engineering
University of Connecticut


Internet users are frequently prompted by a form that requires them to enter private information and is accompanied with a ``privacy statement'' describing the purpose of collection and the type of data usage that will be carried out. How does a user know that the collector will adhere to its privacy statements? Moreover how is it possible to allow marketing, selling or out-sourcing of such data while ensuring that not only the original data collecting entity but also any subsequent holder will not violate the terms of the original agreement? This talk will address the above fundamental problem by introducing a framework called contract-based computing whose aim is to bridge the need for privacy to the need for data collection, marketing and processing, using cryptographic control. Using such framework we show how contract-based computing can be performed efficiently for a number of data processing functionalities that include the extraction of sets, multi-sets, statistics and correlation information from user data.

Joint work with Bulent Yener (RPI), Moti Yung (Columbia U. and RSA)


Aggelos Kiayias is an Assistant Professor of Computer Science and Engineering at the University of Connecticut. His research interests are in cryptography and computer security. At UConn he leads the Crypto-DRM laboratory which is dedicated to the study of cryptographic aspects of digital rights management and related technologies. He is also a founding member of the UConn Voting Technology Research (VoTeR) center that performs security evaluations of electronic voting equipment for the state of Connecticut. Aggelos is a graduate of the Mathematics department of the University of Athens, Greece and has a Ph.D. from the City University of New York. He has received an NSF Career award and was the recipient of a Fulbright fellowship during his doctoral studies. He has published many articles in cryptographic and security subjects including traitor tracing schemes, digital signatures, encryption mechanisms, privacy primitives, electronic voting and others.