Skip to main content

Self-Scrambling Anonymizers

  • Conference paper
  • First Online:
Book cover Financial Cryptography (FC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1962))

Included in the following conference series:

Abstract

For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency, largely due to the use of restrictive blind signatures, on the other hand efficient schemes often suffer from serious security drawbacks. In this paper, we propose both a new tool providing scalable anonymity at a low cost, and a new Internet business: “Anonymity Providers”.

Those “Anonymity Providers” certify re-encrypted data after having been convinced of the validity of the content, but without knowing anything about this latter. It is a very useful third party in many applications (e.g. for revocable anonymous electronic cash, where a coin would be a certified encryption of the user’s identity, such that a Revocation Center, and only it, can recover this identity, if needed).

With this new tool, each user can get the required anonymity level, depending on the available time, computation and/or money amounts. Furthermore, the “Anonymity Provider” may be a new type of business over the Internet, profitable for everybody: - from the provider point of view as he can charge the service; - from the user point of view as he can obtain a high level of anonymity at low computational cost. Moreover, a user who does not require anonymity has no extra computation to perform.

This technique is quite efficient because of its “optimistic” orientation: in case of honest use, everything is very efficient. Some slightly more heavy processes have to be performed in case of fraud detection, but with overwhelming tracing success.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abe. Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers. In Eurocrypt’ 98, LNCS 1403, pages 437–447. Springer-Verlag, Berlin, 1998.

    Chapter  Google Scholar 

  2. M. Abe. Mix-Networks on Permutation Networks. In Asiacrypt’ 99, LNCS 1716. Springer-Verlag, Berlin, 1999.

    Google Scholar 

  3. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among Notions of Security for Public-Key Encryption Schemes. In Crypto’ 98, LNCS 1462, pages 26–45. Springer-Verlag, Berlin, 1998.

    Google Scholar 

  4. M. Bellare and P. Rogaway. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62–73. ACM Press, New York, 1993.

    Google Scholar 

  5. S. A. Brands. An Efficient Off-Line Electronic Cash System Based on the Representation Problem. Technical Report CS-R9323, CWI, Amsterdam, 1993.

    Google Scholar 

  6. S. A. Brands. Restrictive Blinding of Secret-Key Certificates. Technical Report CS-R9509, CWI, Amsterdam, 1995.

    Google Scholar 

  7. E. Brickell, P. Gemmell, and D. Kravitz. Trustee-based Tracing Extensions to Anonymous Cash and Making of Anonymous Change. In SODA’ 95, pages 457–466, 1995.

    Google Scholar 

  8. J. Camenisch, J.-M. Piveteau, and M. Stadler. Fair Blind Signatures. In Eurocrypt’ 95, LNCS 921, pages 209–219. Springer-Verlag, Berlin, 1995.

    Google Scholar 

  9. J. Camenisch, J.-M. Piveteau, and M. Stadler. An Efficient Fair Payment System. In Proc. of the 3rd CCS, pages 88–94. ACM Press, New York, 1996.

    Google Scholar 

  10. D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84–88, February 1981.

    Article  Google Scholar 

  11. D. Chaum. Blind Signatures for Untraceable Payments. In Crypto’ 82, pages 199–203. Plenum, New York, 1983.

    Google Scholar 

  12. D. Chaum. Zero-Knowledge Undeniable Signatures. In Eurocrypt’ 90, LNCS 473, pages 458–464. Springer-Verlag, Berlin, 1991.

    Google Scholar 

  13. D. Chaum, A. Fiat, and M. Naor. Untraceable Electronic Cash. In Crypto’ 88, LNCS 403, pages 319–327. Springer-Verlag, Berlin, 1989.

    Chapter  Google Scholar 

  14. D. Chaum and H. van Antwerpen. Undeniable Signatures. In Crypto’ 89, LNCS 435, pages 212–216. Springer-Verlag, Berlin, 1990.

    Google Scholar 

  15. D. Chaum, E. van Heijst, and B. Pfitzmann. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. In Crypto’ 91, LNCS 576, pages 470–484. Springer-Verlag, Berlin, 1992.

    Google Scholar 

  16. Y. Desmedt and Y. Frankel. Threshold Cryptosystems. In Crypto’ 87, LNCS 293, pages 307–315. Springer-Verlag, Berlin, 1988.

    Google Scholar 

  17. W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6):644–654, November 1976.

    Article  MathSciNet  Google Scholar 

  18. T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, IT-31(4):469–472, July 1985.

    Article  MathSciNet  Google Scholar 

  19. A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions of Identification and Signature Problems. In Crypto’ 86, LNCS 263, pages 186–194. Springer-Verlag, Berlin, 1987.

    Chapter  Google Scholar 

  20. E. Fujisaki and T. Okamoto. Practical Escrow Cash Systems. In Security Protocols, 1996.

    Google Scholar 

  21. S. Goldwasser and S. Micali. Probabilistic Encryption. lournal of Computer and System Sciences, 28:270–299, 1984.

    Article  MathSciNet  Google Scholar 

  22. S. Goldwasser, S. Micali, and R. Rivest. A Digital Signature Scheme Secure Against Adaptative Chosen-Message Attacks. SIAM lournal of Computing, 17(2):281–308, April 1988.

    Article  Google Scholar 

  23. M. Jakobsson. Blackmailing using Undeniable Signatures. In Eurocrypt’ 94, LNCS 950, pages 425–427. Springer-Verlag, Berlin, 1995.

    Chapter  Google Scholar 

  24. M. Jakobsson. A Practical Mix. In Eurocrypt’ 98, LNCS 1403, pages 448–461. Springer-Verlag, Berlin, 1998.

    Chapter  Google Scholar 

  25. M. Jakobsson. Flash Mixing. In Proc. of the 18th PODC, pages 83–89. ACM Press, New York, 1999.

    Google Scholar 

  26. M. Jakobsson and D. M’Rami. Mix-based Electronic Payment. In Proc. of the Fifth Annual Workshop on Selected Areas in Cryptography, LNCS 1556, pages 157–173. Springer-Verlag, Berlin, 1998.

    Chapter  Google Scholar 

  27. M. Jakobsson and J. Müller. Improved Magic Ink Signatures Using Hints. In Financial Cryptography’ 99, LNCS 1648, pages 253–268. Springer-Verlag, Berlin, 1999.

    Chapter  Google Scholar 

  28. M. Jakobsson, K. Sako, and R. Impagliazzo. Designated Verifier Proofs and Their Applications. In Eurocrypt’ 96, LNCS 1070, pages 143–154. Springer-Verlag, Berlin, 1996.

    Google Scholar 

  29. M. Jakobsson and C. P. Schnorr. Efficient Oblivious Proofs of Correct Exponentiation. In B. Preneel, ed., Proc. of CMS’ 99. Kluwer Academic Publishers, Boston, 1999.

    Google Scholar 

  30. M. Jakobsson and M. Yung. Distributed “Magic Ink” Signatures. In Eurocrypt’ 97, LNCS 1233, pages 450–464. Springer-Verlag, Berlin, 1997.

    Google Scholar 

  31. A. Juels, M. Luby, and R. Ostrovsky. Security of Blind Digital Signatures. In Crypto’ 97, LNCS 1294, pages 150–164. Springer-Verlag, Berlin, 1997.

    Google Scholar 

  32. M. Michels and M. Stadler. Efficient Convertible Undeniable Signature Schemes. Fourth Annual Workshop on Selected Areas in Cryptography available from http://www.scs.carleton.ca/~sac97, 1997.

  33. T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In Crypto’ 92, LNCS 740, pages 31–53. Springer-Verlag, Berlin, 1992.

    Chapter  Google Scholar 

  34. D. Pointcheval and J. Stern. Security Proofs for Signature Schemes. In Eurocrypt’ 96, LNCS 1070, pages 387–398. Springer-Verlag, Berlin, 1996.

    Google Scholar 

  35. D. Pointcheval and J. Stern. Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology, 2000. Available from http://www.di.ens.fr/~pointche.

  36. M. O. Rabin. Digitalized Signatures. In R. Lipton and R. De Millo, eds., Foundations of S ecure Computation, pages 155–166. Academic Press, New York, 1978.

    Google Scholar 

  37. C. Radu, R. Govaerts, and J. Vanderwalle. A Restrictive Blind Signature Scheme with Applications to Electronic Cash. In Communications and Multimedia Security II, pages 196–207. Chapman & Hall, London, 1996.

    Google Scholar 

  38. C. Radu, R. Govaerts, and J. Vanderwalle. Efficient Electronic Cash with Restricted Privacy. In Financial Cryptography’ 97, LNCS. Springer-Verlag, Berlin, 1997.

    Google Scholar 

  39. M. K. Reiter and A. D. Rubin. Crowds, anonymous web transactions. ACM Transactions on Information and System Security, 1:66–92, 1998.

    Article  Google Scholar 

  40. C. P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161–174, 1991.

    Article  Google Scholar 

  41. S. von Solms and D. Naccache. On Blind Signatures and Perfect Crimes. Computers &: Security, 11:581–583, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pointcheval, D. (2001). Self-Scrambling Anonymizers. In: Frankel, Y. (eds) Financial Cryptography. FC 2000. Lecture Notes in Computer Science, vol 1962. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45472-1_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-45472-1_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42700-1

  • Online ISBN: 978-3-540-45472-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics