Anonymity-Enhanced Pseudonym System
نویسندگان
چکیده
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonyms. Such schemes are of significant practical relevance because it is the best means of providing privacy for users. In previous works, users transact with a organization by demonstration of possession of a credential issued by the organization or relationship with another credential. However, the information that a user has a credential from a specific organization compromises privacy of the user. In the present paper, we give a formal definition of practical pseudonym system in which the level of privacy provided can be chosen be according to security policies.
منابع مشابه
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks
A vehicle can be tracked by monitoring the messages broadcast from it. The broadcast by a source contains its current identity and also allows estimation of its location by receivers. This mapping between the physical entity and the estimated location through the communication broadcast is a threat to privacy. A vehicle can preserve its anonymity by being indistinguishable in the neighborhood c...
متن کاملCooperative pseudonym change scheme based on the number of neighbors in VANETs
In Vehicular Ad hoc NETworks (VANETs), trigger-based pseudonym change schemes play an important role in providing anonymity. However, the anonymity provided by these schemes usually is low mainly because the behavior of changing pseudonym is individual. Considering cooperation on changing pseudonym can enhance anonymity, in this paper, we give a general cooperation framework. As an application ...
متن کاملIron Mask: Trust-Preserving Anonymity on the Face of Stigmatization in Social Networking Sites
Social networking sites are pervasively being used for seeking advice, asking questions, giving answers, and sharing experiences on various topics including health. When users share content about sensitive health topics, such as sexual dysfunction, infertility, or STDs, they may wish to do so anonymously to avoid stigmatization and the associated negative effects on mental health. However, a us...
متن کاملA Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [Bellare and Rogaway, 1994] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. The model abstracts away from how a specific instance of anonymous credential system achieves its goals; instead it defines what these goals are. The notions of credential unforgeability, non-tran...
متن کاملAn Anonymity Scheme Based on Pseudonym in P2P Networks
One of the fundamental challenges in P2P (Peer to Peer) networks is to protect peers’ identity privacy. Adopting anonymity scheme is a good choice in most of networks such as the Internet, computer and communication networks. In this paper, we proposed an anonymity scheme based on pseudonym in which peers are motivated not to share their identity. Compared with precious anonymous scheme such as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003