Pseudonym Systems ( Extended
نویسندگان
چکیده
Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be linked, but are formed in such a way that a user can prove to one organization a statement about his relationship with another. Such a statement is called a credential. Previous work in this area did not protect the system against dishonest users who collectively use their pseudonyms and credentials, i.e., share an identity. Previous practical schemes also relied very heavily on the involvement of a trusted center. In the present paper we give a formal definition of pseudonym systems where users are motivated not to share their identity, and in which the trusted center’s involvement is minimal. We give theoretical constructions for such systems based on any one-way function. We also suggest an efficient and easy-to-implement practical scheme.
منابع مشابه
A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems
A decentralized pseudonym scheme is proposed for providing storage, encryption and authentication of patients’ EHRs in cloud-based eHealth systems. The pseudonyms of a patient are generated from the patient’s secrets and each of them is used as the index of an EHR entry of the patient. An encryption key derived from the pseudonym can be used to encrypt the corresponding EHR entry. The pseudonym...
متن کاملSpecial Section on Advances in Vehicular Clouds
The vehicular cloud is a promising new paradigm, where vehicular networking and mobile cloud computing are elaborately integrated to enhance the quality of vehicular information services. Pseudonym is a resource for vehicles to protect their location privacy, which should be efficiently utilized to secure vehicular clouds. However, only a few existing architectures of pseudonym systems take fle...
متن کاملA Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [Bellare and Rogaway, 1994] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. The model abstracts away from how a specific instance of anonymous credential system achieves its goals; instead it defines what these goals are. The notions of credential unforgeability, non-tran...
متن کاملThe strange case of mr_hyde, mr_hyde1, and mr_hyde2... – Experimental evidence on reputation systems and pseudonym changes
Experiments on online reputation systems have shown that they can enhance the evolution of trust. However, previous experimental work fails to account for the separation of person and reputation in the Internet. Our experiment looks at the effects of costless pseudonym changes on the efficiency of reputation systems. Subjects play the trust game with changing partners whom they rate afterwards....
متن کاملReputation Systems for Anonymous Networks
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network. Misbehavior is one of the biggest problems in pseudonymous P2P systems, where there is little incentive for proper behavior. In our scheme, using ecash for reputation points, the reputation of each user is closely related to his real identity rather than to his current pseudonym. Thus, our schem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999