Skip to main content

Authentic Attributes with Fine-Grained Anonymity Protection

  • Conference paper
  • First Online:
Financial Cryptography (FC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1962))

Included in the following conference series:

Abstract

Collecting accurate profile information and protecting an individual’s privacy are ordinarily viewed as being at odds. This paper presents mechanisms that protect individual privacy while presenting accurate-indeed authenticated-profile information to servers and merchants. In particular, we give a pseudonym registration scheme and system that enforces unique user registration while separating trust required of registrars, issuers, and validators. This scheme enables the issuance of global unique pseudonyms (GUPs) and attributes enabling practical applications such as authentication of accurate attributes and enforcement of “one-to-a-customer” properties.

We also present a scheme resilient to even pseudonymous profiling yet preserving the ability of merchants to authenticate the accuracy of information. It is the first mechanism of which the authors are aware to guarantee recent validity for group signatures, and more generally multi-group signatures, thus effectively enabling revocation of all or some of the multi-group certificates held by a principal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Giuseppe Ateniese and Gene Tsudik. “Some Open Issues and New Directions in Group Signatures” in Preproceedings of Financial Cryptography: FC’99.

    Google Scholar 

  2. Dan Boneh and Matthew Franklin. “An Efficient Public Key Traitor Tracing Scheme”, in Advances in Cryptology-CRYPTO’ 99, M. Wiener (ed.), Springer-Verlag, LNCS vol. 1666, pp. 338–353, 1999.

    Chapter  Google Scholar 

  3. Dan Boneh and Matthew Franklin. “Anonymous Authentication with Subset Queries”, in CCS’99-6 th ACM Conference on Computer and Communications Security, ACM Press, November 1999.

    Google Scholar 

  4. Jan Camenisch and Markus Stadler. “Efficient Group Signature Schemes for Large Groups”, in Advances in Cryptology-CRYPTO’ 97.

    Google Scholar 

  5. David Chaum “Security without Identification: Transaction Systems to Make Big Brother Obsolete”, CACM(28,10), October 1985, pp. 1030–1044.

    Google Scholar 

  6. David Chaum and Eugene van Heyst. in Advances in Cryptology-EUROCRYPT’ 91.

    Google Scholar 

  7. Yvo Desmedt and Yair Frankel. “Threshold Cryptosystems” in Advances in Cryptology-CRYPTO’ 89, Springer-Verlag, 1990, pp. 307–315.

    Google Scholar 

  8. Cynthia Dwork, Jeffrey Lotspiech, Moni Naor. “Digital Signets: Self-Enforcing Protection of Digital Information” in Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing (STOC’ 96).

    Google Scholar 

  9. Matthew K. Franklin and Dahlia Malkhi. “Auditable Metering with Lightweight Security”, in Financial Cryptography: FC’ 97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 151–160, 1998.

    Chapter  Google Scholar 

  10. Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, and Alain Mayer. “Consistent, Yet Anonymous, Web Access with LPWA”, Communications of the ACM, vol. 42 no. 2, February 1999, pp. 42–47.

    Article  Google Scholar 

  11. David Goldschlag, Michael Reed and Paul Syverson. “Onion Routing for Anonymous and Private Internet Connection”, Communications of the ACM, vol. 42 no. 2, February 1999, pp. 39–41. (More information and further publications at http://www.onion-router.net)

    Article  Google Scholar 

  12. Joe Kilian and Erez Petrank. “Identity Escrow”, in Advances in Cryptology-CRYPTO’ 98, H. Krawczyk (ed.), Springer-Verlag, LNCS vol. 1462, pp. 169–185, 1998.

    Chapter  Google Scholar 

  13. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, and Stefan Wolf. “Pseudonym Systems”, in Proceedings of the Sixth Annual Workshop on Selected Areas in Cryptography (SAC’ 99) forthcoming in Springer-Verlag LNCS.

    Google Scholar 

  14. Declan McCullagh. “Big Brother, Big ‘Fun’ at Amazon”, Wired News, Aug. 25, 1999. http://www.wired.com/news/news/business/story/21417.html

  15. David Mazieres and M. Frans Kaashoek. “The Design, Implementation and Operation of an Email Pseudonym Server”, in CCS’98-5 th ACM Conference on Computer and Communications Security, ACM Press, pp. 27–36, November 1998.

    Google Scholar 

  16. Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. “Protocols using Anonymous Connections: Mobile Applications”, in Security Protocols: 5 th International Workshop, B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.), Springer-Verlag, LNCS vol. 1361, pp. 13–23, 1997.

    Chapter  Google Scholar 

  17. Stuart Stubblebine. “Recent-Secure Authentication: Enforcing Revocation in Distributed Systems” in Proceedings of the 1995 IEEE Symposium on Security and Privacy, IEEE CS Press, pp. 224–234, May 1995.

    Google Scholar 

  18. Stuart G. Stubblebine, Paul F. Syverson, and David M. Goldschlag. “Unlinkable Serial Transactions: Protocols and Applications”, ACM Transaction on Information and Systems Security, Vol. 2, No 4, 1999. A preliminary version of this paper appears in [26].

    Google Scholar 

  19. Paul F. Syverson, Stuart G. Stubblebine, and David M. Goldschlag. “Unlinkable Serial Transactions”, in Financial Cryptography: FC’ 97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 39–55, 1998.

    Chapter  Google Scholar 

  20. Paul Syverson and Stuart Stubblebine. “Group Principals and the Formalization of Anonymity”, in FM’99-Formal Methods, Vol. I, J. M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS vol. 1708, pp. 814–833, 1999.

    Chapter  Google Scholar 

  21. Thomas Wu, Michael Malkin, and Dan Boneh. “Building Intrusion Tolerant Applications”, in Proceedings of the Eighth USENIX Security Symposium (Security’ 99), The USENIX Association, pp. 79–91, August 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stubblebine, S.G., Syverson, P.F. (2001). Authentic Attributes with Fine-Grained Anonymity Protection. In: Frankel, Y. (eds) Financial Cryptography. FC 2000. Lecture Notes in Computer Science, vol 1962. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45472-1_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-45472-1_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42700-1

  • Online ISBN: 978-3-540-45472-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics