Anonymous attribute certificates based on traceable signatures
نویسندگان
چکیده
Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and unlinkable access to web resources based on the privileges that users hold. Moreover, the scheme allows for anonymity revocation and tracing of unlinkable accesses. Research limitations/implications – The power of the attribute authority should be divided into several entities, one of them being a trusted third party, to avoid illicit disclosing of information. Practical implications – New systems with support for anonymous access to web resources can be developed. Originality/value – This paper adds the unlinkability property to anonymous accesses together with a tracing facility to existing proposals.
منابع مشابه
Traceability, linkability and policy hiding in attribute-based signature schemes
Often we are less concerned with who signed something than with what attributes (director of this company etc.) they have. We propose three Attribute Based Signature schemes, namely, Decentralised Traceable Attribute Based Signatures DTABS, Attribute Based Signatures with UserControlled Linkability ABS-UCL, and Attribute Based Signatures with Hidden Expressive Policy ABS-HEP. The Traceability a...
متن کاملDecentralized Traceable Attribute-Based Signatures
Attribute-based signatures allow a signer owning a set of attributes to anonymously sign a message w.r.t. some signing policy. A recipient of the signature is convinced that a signer with a set of attributes satisfying the signing policy has indeed produced the signature without learning the identity of the signer or which set of attributes was used in the signing. Traceable attribute-based sig...
متن کاملReview on Credential Systems in Anonymizing Networks
A credential system is a system in which users can obtain credentials from organizations and reveal possession of these credentials. This system is called anonymous when transactions carried out by the same user cannot be linked. In this paper we are describing few such credential systems. Nymble is a credential system in which servers themselves can blacklist misbehaving users, and thus blocks...
متن کاملEfficient Traceable Signatures in the Standard Model
Traceable signatures (TS), suggested by Kiayias, Tsiounis and Yung (Eurocrypt’04), extend group signatures to address various basic traceability issues beyond merely identifying the anonymous signer of a rogue signature. Namely, they enable the efficient tracing of all signatures produced by a misbehaving party without opening the identity of other parties. They also allow users to provably cla...
متن کاملRFC 5636 Traceable Anonymous Certificate August 2009
This document defines a practical architecture and protocols for offering privacy for a user who requests and uses an X.509 certificate containing a pseudonym, while still retaining the ability to map such a certificate to the real user who requested it. The architecture is compatible with IETF certificate request formats such as PKCS10 (RFC 2986) and CMC (RFC 5272). The architecture separates ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Internet Research
دوره 16 شماره
صفحات -
تاریخ انتشار 2006