Accountable Anonymous Communication
نویسندگان
چکیده
In this chapter we motivate the need for anonymity at the communication layer and describe the potential risks of having traceable communications. We then introduce the legal requirements on data retention and motivate the need for revocability of anonymity upon the request of law enforcement. We describe the main building blocks for anonymous communication and for anonymity revocation. We explain how these building blocks can be combined in order to build a revocable anonymous communication infrastructure that fulfills both privacy and law enforcement requirements.
منابع مشابه
Accountable Anonymous Access to Services in Mobile Communication Systems
We introduce a model that allows anonymous yet accountable access to services in mobile communication systems. This model is based on the introduction of a new business role, called the customer care agency, and a ticket based mechanism for service access. We introduce the general idea of ticket based service access, and present a categorisation of ticket types and ticket acquisition models. We...
متن کاملAnonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference
For The Information Society 15(2) 2 ABSTRACT The Internet offers new opportunities for anonymous and pseudonymous communications. Users can, for example, engage in political advocacy, receive counseling, and perform commercial transactions without disclosing their identities. The cloak of anonymity can also facilitate socially unacceptable or criminal activities because of the difficulty in hol...
متن کاملCoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
The decentralized currency network Bitcoin is emerging as a potential new way of performing financial transactions across the globe. Its use of pseudonyms towards protecting users’ privacy has been an attractive feature to many of its adopters. Nevertheless, due to the inherent public nature of the Bitcoin transaction ledger, users’ privacy is severely restricted to linkable anonymity, and a fe...
متن کاملAn Anonymous but Accountable Proxy Multi-signature Scheme
in a proxy multi-signature, the proxy signer can sign a message on behalf of more than one original signer. However, in some cases, the proxy or the original signers do not want to leak the proxy signer's identity. In addition, when something is wrong with the signed message, the identity of the proxy signer has to be revealed. So the problem of anonymous but accountable has been proposed. Usin...
متن کاملAn Accountable Anonymous Data Aggregation Scheme for Internet of Things
The Internet of Things (IoT) has become increasingly popular in people’s daily lives. The pervasive IoT devices are encouraged to share data with each other in order to better serve the users. However, users are reluctant to share sensitive data due to privacy concerns. In this paper, we study the anonymous data aggregation for the IoT system, in which the IoT company servers, though not fully ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007