Review on Credential Systems in Anonymizing Networks
نویسنده
چکیده
A credential system is a system in which users can obtain credentials from organizations and reveal possession of these credentials. This system is called anonymous when transactions carried out by the same user cannot be linked. In this paper we are describing few such credential systems. Nymble is a credential system in which servers themselves can blacklist misbehaving users, and thus blocks users but keeps their anonymity intact. Pseudonym systems permit users to communicate with many organizations secretly with the use of pseudonyms. An anonymous credential system is based on the strong RSA assumption and the decisional Diffie-Hellman assumption. It allows a user to unlinkably demonstrate possession of a credential as many times as necessary without involving the issuing organization. Traceable signatures extend group signatures to address various basic traceability issues beyond merely identifying the anonymous signer of a rogue signature. Dynamic accumulators allow capable membership revocation in anonymous setting. Verifier local revocation is the approach of membership revocation in the group signatures. In this revocation method only verifiers are concerned, and signers have no involvement. Keywords– Credential Systems, Pseudonymous system, Nymble, Anonymous credential system, Dynamic accumulator, Traceable Signature, Verifier local revocation.
منابع مشابه
Tracing Misbehaving Users by Utilizing Ticket-Based Protocols by Trusted Third Party in Anonymizing Networks
–Anonymizing networks provides network services to users without specific identity. Network administrator cannot identify user actions in anonymizing networks. Anonymizing networks such as The Onion Routing Networks (TOR) uses a layer structured encrypted message and series of routers each with a key to decrypt and forward the message. Which hide’s the client’s IP address from the server. The l...
متن کاملMisbehaving Users in Anonym Zing Network
Anonymizing network provides web services to the users and also hide the client’s IP address from the server. All data is wrapped with several layer of encryption. The success of this network, hackers can easily deface popular web site. If the users misbehave, blocking particular IP addresses is difficult. Nymble system is a credential system in which servers can blacklist misbehaving users in ...
متن کاملApu Kapadia: Research Statement past and Current Research
My research focuses on computer security, with particular emphasis on user privacy. I like to apply sound theoretical techniques to societally relevant problems—a significant portion of my research has focused on empowering users to protect their privacy in a networked society where their personal information or habits are increasingly available to potentially-unauthorized third parties. I have...
متن کاملA Review on Energy Storage Systems Planning in Active Distribution Networks and its Applications
With the restructuring of power systems, increase of renewable energy sources, and as networks become smarter, power systems are facing new challenges such as uncertainty in available energy resources. An appropriate solution to address these challenges are to use energy storage systems. Therefore, sizing, location, and selection of energy storage systems are important to maximize their benefit...
متن کاملA Role Based Trust Model for Peer to Peer Systems Using Credential Trees
This paper deals with a Role based Trust (RT) model for Peer-to-Peer (P2P) networks. P2P networks are essentially decentralized in nature to enhance resource sharing and collaboration. The anonymous and open nature of P2P systems offers an almost ideal environment for unauthorized access of digital content and also for easy distribution of malware. Today’s popular P2P systems have to challenge ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014