Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks
نویسندگان
چکیده
structured abstract Research paper Purpose To enhance security and privacy of e-cash systems that apply revocable anonymity by presenting a stochastic attack, that reveals the hidden ID, and suitable protection means against this kind of attacks. Methodology/Approach The feasibility of a stochastic attack that reveals the ID of user of e-cash schemes with revocable anonymity is shown. To avoid such attacks the application of modulo operations while constructing e-cash coins is proposed. Measurement results are used to back up the suitability of this approach. Findings Revocable anonymity systems can successfully be attacked. Applying modulo operations can prevent such attacks. Practical implications The recommendations given in this paper should be applied whenever an e-cash scheme or similar system with revocable anonymity is designed. Otherwise the promised feature may be compromised very easily. Originality/value of paper The paper identifies a formerly unknown attack against systems with revocable identities, and presents a mathematical solution to protect such systems against the attack presented.
منابع مشابه
Mini-Cash: A Minimalistic Approach to E-Commerce
By introducing a new e-commerce paradigm that of disposable anonymous accounts we are able to reduce storage requirements, while protecting against strong attacks on the system, and keeping computational requirements low. Our proposed scheme reduces storage costs of payers and merchants to the lowest theoretically possible, offers users computational (but not revocable) privacy, and protects ag...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملSecuring Privacy Assistance for Protecting Location Based Queries Using Enhanced Symmetric Key
-While satisfying security requirements is crucial for secure group communications in wireless systems, mobile group applications often have application-specific performance requirements in terms of timeliness, reliability, and system reconfigurability. Often there exists a tradeoff between security versus performance goals since security protocols may introduce undue computational and network ...
متن کاملUsers as Prosumers of PETs : The Challenge of Involving Users in the Creation of Privacy Enhancing Technologies
Frequent contact with online businesses requires Internet users to distribute large amounts of personal information. This spreading of users’ information through different Websites can eventually lead to increased probabilities for identity theft, profiling and linkability attacks, as well as other harmful consequences. Methods and tools for securing people’s online activities and protecting th...
متن کاملPrivacy through Fake yet Semantically Real Traces
Camouflaging data by generating fake information is a wellknown obfuscation technique for protecting data privacy. The effectiveness of this technique in protecting users’ privacy highly depends on the resemblance of fake information to reality, such that an adversary cannot easily filter such fake information out. In this paper, we focus on a very sensitive and increasingly exposed type of dat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Internet Research
دوره 16 شماره
صفحات -
تاریخ انتشار 2006