Anonymity-Enhanced Pseudonym System

نویسندگان

  • Yuko Tamura
  • Atsuko Miyaji
چکیده

Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonyms. Such schemes are of significant practical relevance because it is the best means of providing privacy for users. In previous works, users transact with a organization by demonstration of possession of a credential issued by the organization or relationship with another credential. However, the information that a user has a credential from a specific organization compromises privacy of the user. In the present paper, we give a formal definition of practical pseudonym system in which the level of privacy provided can be chosen be according to security policies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks

A vehicle can be tracked by monitoring the messages broadcast from it. The broadcast by a source contains its current identity and also allows estimation of its location by receivers. This mapping between the physical entity and the estimated location through the communication broadcast is a threat to privacy. A vehicle can preserve its anonymity by being indistinguishable in the neighborhood c...

متن کامل

Cooperative pseudonym change scheme based on the number of neighbors in VANETs

In Vehicular Ad hoc NETworks (VANETs), trigger-based pseudonym change schemes play an important role in providing anonymity. However, the anonymity provided by these schemes usually is low mainly because the behavior of changing pseudonym is individual. Considering cooperation on changing pseudonym can enhance anonymity, in this paper, we give a general cooperation framework. As an application ...

متن کامل

Iron Mask: Trust-Preserving Anonymity on the Face of Stigmatization in Social Networking Sites

Social networking sites are pervasively being used for seeking advice, asking questions, giving answers, and sharing experiences on various topics including health. When users share content about sensitive health topics, such as sexual dysfunction, infertility, or STDs, they may wish to do so anonymously to avoid stigmatization and the associated negative effects on mental health. However, a us...

متن کامل

A Security Model for Anonymous Credential Systems

This paper proposes a formal model of the Bellare-Rogaway type [Bellare and Rogaway, 1994] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. The model abstracts away from how a specific instance of anonymous credential system achieves its goals; instead it defines what these goals are. The notions of credential unforgeability, non-tran...

متن کامل

An Anonymity Scheme Based on Pseudonym in P2P Networks

One of the fundamental challenges in P2P (Peer to Peer) networks is to protect peers’ identity privacy. Adopting anonymity scheme is a good choice in most of networks such as the Internet, computer and communication networks. In this paper, we proposed an anonymity scheme based on pseudonym in which peers are motivated not to share their identity. Compared with precious anonymous scheme such as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003