Location
Hilton Hawaiian Village, Honolulu, Hawaii
Event Website
https://hicss.hawaii.edu/
Start Date
3-1-2024 12:00 AM
End Date
6-1-2024 12:00 AM
Description
Sharing sensitive information, such as location data, or health data, is a complex problem. While users may desire the benefits of application that use sensitive information, adoption may be limited by user reluctance to share sensitive data with untrusted third parties. We propose the False Position Protocol, a decentralized algorithm that allows users to reveal information such as location to trusted partners through a homomorphic encryption identification process. The algorithm offers reduced computational complexity while maintaining resilience despite potential malicious actors. Potential applications of the proposed two-party sharing protocol include connecting in social networks, exchanging health information, geotagging content, as well as proximity testing for media content delivery.
Recommended Citation
Teodorescu, Mike and Ransbotham, Sam, "Preserving Location Privacy for Mobile Phones with Homomorphic Encryption: The False Position Protocol" (2024). Hawaii International Conference on System Sciences 2024 (HICSS-57). 6.
https://aisel.aisnet.org/hicss-57/hc/security_and_privacy/6
Preserving Location Privacy for Mobile Phones with Homomorphic Encryption: The False Position Protocol
Hilton Hawaiian Village, Honolulu, Hawaii
Sharing sensitive information, such as location data, or health data, is a complex problem. While users may desire the benefits of application that use sensitive information, adoption may be limited by user reluctance to share sensitive data with untrusted third parties. We propose the False Position Protocol, a decentralized algorithm that allows users to reveal information such as location to trusted partners through a homomorphic encryption identification process. The algorithm offers reduced computational complexity while maintaining resilience despite potential malicious actors. Potential applications of the proposed two-party sharing protocol include connecting in social networks, exchanging health information, geotagging content, as well as proximity testing for media content delivery.
https://aisel.aisnet.org/hicss-57/hc/security_and_privacy/6