Abstract
Collecting accurate profile information and protecting an individual’s privacy are ordinarily viewed as being at odds. This paper presents mechanisms that protect individual privacy while presenting accurate-indeed authenticated-profile information to servers and merchants. In particular, we give a pseudonym registration scheme and system that enforces unique user registration while separating trust required of registrars, issuers, and validators. This scheme enables the issuance of global unique pseudonyms (GUPs) and attributes enabling practical applications such as authentication of accurate attributes and enforcement of “one-to-a-customer” properties.
We also present a scheme resilient to even pseudonymous profiling yet preserving the ability of merchants to authenticate the accuracy of information. It is the first mechanism of which the authors are aware to guarantee recent validity for group signatures, and more generally multi-group signatures, thus effectively enabling revocation of all or some of the multi-group certificates held by a principal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Giuseppe Ateniese and Gene Tsudik. “Some Open Issues and New Directions in Group Signatures” in Preproceedings of Financial Cryptography: FC’99.
Dan Boneh and Matthew Franklin. “An Efficient Public Key Traitor Tracing Scheme”, in Advances in Cryptology-CRYPTO’ 99, M. Wiener (ed.), Springer-Verlag, LNCS vol. 1666, pp. 338–353, 1999.
Dan Boneh and Matthew Franklin. “Anonymous Authentication with Subset Queries”, in CCS’99-6 th ACM Conference on Computer and Communications Security, ACM Press, November 1999.
Jan Camenisch and Markus Stadler. “Efficient Group Signature Schemes for Large Groups”, in Advances in Cryptology-CRYPTO’ 97.
David Chaum “Security without Identification: Transaction Systems to Make Big Brother Obsolete”, CACM(28,10), October 1985, pp. 1030–1044.
David Chaum and Eugene van Heyst. in Advances in Cryptology-EUROCRYPT’ 91.
Yvo Desmedt and Yair Frankel. “Threshold Cryptosystems” in Advances in Cryptology-CRYPTO’ 89, Springer-Verlag, 1990, pp. 307–315.
Cynthia Dwork, Jeffrey Lotspiech, Moni Naor. “Digital Signets: Self-Enforcing Protection of Digital Information” in Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing (STOC’ 96).
Matthew K. Franklin and Dahlia Malkhi. “Auditable Metering with Lightweight Security”, in Financial Cryptography: FC’ 97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 151–160, 1998.
Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, and Alain Mayer. “Consistent, Yet Anonymous, Web Access with LPWA”, Communications of the ACM, vol. 42 no. 2, February 1999, pp. 42–47.
David Goldschlag, Michael Reed and Paul Syverson. “Onion Routing for Anonymous and Private Internet Connection”, Communications of the ACM, vol. 42 no. 2, February 1999, pp. 39–41. (More information and further publications at http://www.onion-router.net)
Joe Kilian and Erez Petrank. “Identity Escrow”, in Advances in Cryptology-CRYPTO’ 98, H. Krawczyk (ed.), Springer-Verlag, LNCS vol. 1462, pp. 169–185, 1998.
Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. “Pseudonym Systems”, in Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography (SAC’ 99) forthcoming in Springer-Verlag LNCS.
Declan McCullagh. “Big Brother, Big ‘Fun’ at Amazon”, Wired News, Aug. 25, 1999. http://www.wired.com/news/news/business/story/21417.html
David Mazieres and M. Frans Kaashoek. “The Design, Implementation and Operation of an Email Pseudonym Server”, in CCS’98-5 th ACM Conference on Computer and Communications Security, ACM Press, pp. 27–36, November 1998.
Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. “Protocols using Anonymous Connections: Mobile Applications”, in Security Protocols: 5 th International Workshop, B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.), Springer-Verlag, LNCS vol. 1361, pp. 13–23, 1997.
Stuart Stubblebine. “Recent-Secure Authentication: Enforcing Revocation in Distributed Systems” in Proceedings of the 1995 IEEE Symposium on Security and Privacy, IEEE CS Press, pp. 224–234, May 1995.
Stuart G. Stubblebine, Paul F. Syverson, and David M. Goldschlag. “Unlinkable Serial Transactions: Protocols and Applications”, ACM Transaction on Information and Systems Security, Vol. 2, No 4, 1999. A preliminary version of this paper appears in [26].
Paul F. Syverson, Stuart G. Stubblebine, and David M. Goldschlag. “Unlinkable Serial Transactions”, in Financial Cryptography: FC’ 97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 39–55, 1998.
Paul Syverson and Stuart Stubblebine. “Group Principals and the Formalization of Anonymity”, in FM’99-Formal Methods, Vol. I, J. M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS vol. 1708, pp. 814–833, 1999.
Thomas Wu, Michael Malkin, and Dan Boneh. “Building Intrusion Tolerant Applications”, in Proceedings of the Eighth USENIX Security Symposium (Security’ 99), The USENIX Association, pp. 79–91, August 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stubblebine, S.G., Syverson, P.F. (2001). Authentic Attributes with Fine-Grained Anonymity Protection. In: Frankel, Y. (eds) Financial Cryptography. FC 2000. Lecture Notes in Computer Science, vol 1962. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45472-1_19
Download citation
DOI: https://doi.org/10.1007/3-540-45472-1_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42700-1
Online ISBN: 978-3-540-45472-4
eBook Packages: Springer Book Archive