Title: Consumer Payments Market Space
1(No Transcript)
2Privacy Technology
Analysis and Mechanisms
David Chaum
3Privacy is fundamentallyimportant!!!
- Is essential for democracy
- Needed for participation without fear of
retribution - Is a fundamental human right
4OUTLINE
- Analysis
- Policy
- Economic
- Solution Mechanisms
- Legal
- Technological
- Privacy Technology
5Policy Analysis
- The actors and macro considerations
6Hierarchy of IT Needs of Humans
- Self-Worthrelation to artificial
intelligence, etc. - Privacyidentity, credential role protection
- Interactioncommunication, exploration, commerce
- Securityuptime, robustness, no hacking
- Processingstorage, interface, crunching
Maslows Hierarchy of Needs
7Policy Issues
8Economic Analysis
- These days,
- everybodys an economist!
9Monetizing privacy
- Various schemes proposed (even 20 years ago)
- Consumers pay for privacy protection services
- Consumers are paid for use of their
privacy-related data - A brokerage of privacy related data
10Imbalance in desire for privacy/data
- Individuals discount present value of privacy
protection in transactions - Explains anomalous behavior of consumers when
confronted with cost or inconvenience - Practices and potential dangers unknown
- Organizations value personal data
- Overestimate future potential of data
- Discount exposure to organization
- An organization not too concerned about dangers
posed to consumers that it is not accountable for
11Imbalance in size/power of entities
- Organizations have lots of leverage
- Their are few sources of mass products and
services - Consumers dont have much choice for many
products or services - High relative cost of change of practices for
consumers
12Legal mechanisms
- Powerful but dont work well directly
13Legal mechanismsevolution
- Originally based on codifying legitimate
expectation of privacy - People should be able to review and amend data
- No erosion of privacy due to technology
- Best privacy protection practical
14Legal mechanismscapabilities
- Accountability after the fact is ineffective
- Hardly able to address
- Covert/clandestine abuse
- Abuse of public or leaked data
- Corporate shield
- Undoing damage done to people
- Can cause creation and use of infrastructure
15Technological Mechanisms
- The directly-effective mechanism
16Locus of privacy-related controlThe critical
architectural choice
Organization x
infomediary
17Locus of controlThree choices
- At organizations
- Weak benefit/effect for consumers
- Clandestine abuse, leaks, reversibility
- Mollify/diffuse the issue prevent effective
solutions - At an intermediary
- Create infrastructure with single point of
failure - Full cost but little true benefit
- Dangerous concentration
- At the individual
- Privacy technology the only good solution
18Old paradigmassumptions/model proven false!
- Believed to be a zero-sum game, privacy v.
security - ID believed needed for security against abuse by
individuals - ID believed only way to organize data
19Old Paradigm
20New paradigm
- Individuals provide organizations with minimum
sufficient information and proof of its
correctness
21Privacy Technology
- Win-Win break of the believed tradeoff
22New Paradigm
23Feasibility of a comprehensive solution set has
been proven
- PaymentseCash payments deployed by major banks
on 4 continents - CommunicationMix nets, onion routing, etc. have
been widely deployed - Credentialsmechanisms implemented on cards and
by IBM
24Benefits to organizations (micro)
- Reduced exposure/liability
- Better data
- Cleaner because less deception and garbage
- More willingness to provide data because of
protections - All organizations get the data level playing
field - Better public image (?) probably wrong!
25Not easy to get there from here
- Requires lots of users (hard to be anonymous
alone!) - Difficult to get the system primed
- Consumers dont want to pay costs
- Organizations tend to resist change
26Really an infrastructure issue
- Pseudonymity / Anonymity only in numbers (as
mentioned) - Communication infrastructure can nullify
protections - Way to share data pseudonymously is infrastructure
27CONCLUSION
- A Privacy Technology infrastructure is the way
to go and would be hugely beneficial
28(No Transcript)
29Kinds of Privacy for Payments
Organization-controlled privacy
Consumer- controlled privacy
No privacy
False privacy
Protection only from merchant
credit cards on the Internet
eCash
Buy/reload card without identification
Advertise consumer privacy
stored-value cards
technology / time
pre-paid phone cards
Government payments, e.g.
transfer-order systems
bank notes coins
30Consumer Payments Market Space
scheduledpayments
irregularpayments
high value
low value
10
31Electronic Cash
- You can buy a digital bearer instrument from a
bank with funds in your account - You can pay by giving the instrument to the
payee, who deposits to an account
32(No Transcript)
33(No Transcript)
34zoom in on eCash blinding
35Privacy and Control over Payments
- Nobody can learn without your cooperation who you
pay, how much you pay, or when - You can always prove who received any payment,
for how much, and when - Payments can only be made by you and they cannot
be stopped by others
36(No Transcript)
37(No Transcript)
38Credential Mechanisms
- You deal with each organization under a distinct
digital pseudonyma public key whose
corresponding private key only you know - You obtain a credential as a digital signature
formed on one of your digital pseudonyms - You answer the queries you choose to by proving
you have sufficient credentials
39(No Transcript)
40(No Transcript)
41Wallet with Observer
- A tamper-resistant chip, issued by a trusted
authority, is carried by the individual - But the chip can only talk to the outside world
through the persons PC/PDA - The two devices perform a multiparty computation
and thus speak to the outside world with a common
voice
42How untraceable-sending works
Mix network
The mix sever decrypts and re-orders inputs
43Prevents tracing messages back
message 2
44Cascade of three Mixes
PK3
PK1
PK2
Server 3
Server 2
Server 1
45Encryption of message
PK3
PK1
PK2
message
Ciphertext EPK1EPK2EPK3message
46Processing the messages
Server 1
Server 2
Server 3
47Tracing prevented by any mix
Server 1
Server 3
Server 2
m3
48(No Transcript)
49IAO
- The Information Awareness Office (IAO) develops
and demonstrates information technologies and
systems to counter asymmetric threats by
achieving total information awareness useful for
preemption, national security warning and
national security decision-making. John
Poindexter, national security adviser to former
President Reagan, is the director of the new
agency. He was a controversial figure both for
his role in the Iran-contra scandals and for his
efforts to assert military influence over
commercial computer security technologies. NSDD
145 Data Mining.