Abstract
Confidential and authenticated communication is an elementary necessity in open networks like the Internet and has already been realised. In the last years one more criterion of security has become conscious to users of the Internet: privacy.
Especially in the most popular service of the Internet, the World Wide Web (WWW), this need has become obvious. There, users want to anonymously access web pages to leave as little information as possible while browsing. Vice versa it is quite legitimate and understandable in the aspect of multilateral security, that provider of web pages want to offer these pages in the same way.
At first glance, these properties of confidence, authenticity, and anonymity are very contradictory. How can mutual anonymous partners contact each other and exchange authenticated keys to securely communicate with each other?
This article shows a solution to this problem, using pseudonym based signatures and an architecture providing untraceability via a mix net and two kinds of trusted third parties.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35586-3_46
Chapter PDF
Similar content being viewed by others
References
Anonymizer: http : //www.anonymizer.com/
O. Berthold, H. Federrath, S. Köpsell, “Web MIXes: A System for Anonymous and Unobservable Internet Access”, International Workshop on Design Issues in Anonymity and Unobservability 2000, LNCS 2009, p. 115–129
D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”, Communications of the ACM, February 1981, Vol. 24, No. 2
D. Chaum, A. Fiat, M. Naor, “Untraceable electronic cash”, Advances in Cryptology — Crypto 88, Lecture Notes in Computer Science, Springer-Verlag
R. Clayton, G. Danezis, M. Kuhn, “Real World Patterns of Failure in Anonymity Systems”, Information Hiding Workshop 2001, April 2001
J. Claessens, B. Preneel, J. Vandewalle, “Solutions for Anonymous Communications on the Internet”, ICCST — IEEE International Carnahan Conference on Security Technology, 1999, pp. 298–303
T. Demuth, A. Rieke, “On Securing the Anonymity of Content Providers in the World Wide Web”, Proceedings of SPIE 99, Vol. 3657, San Jose, California, January 1999, pp. 494–502
National Bureau of Standards, NBS FIPS PUB 64, “Data Encryption Standard” National Bureau of Standards, U.S. Department of Commerce, Jan. 1977
W. Diffie, M.E Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol. IT-22, No. 6, November 1976, pp. 644–654
E. Franz, A.Graubner, A. Jerichow, A. Pfitzmann, “Modelling mix-mediated anonymous communication and preventing pool-mode attacks”, Global IT Security, Proceeding of the XV IFIP World Computer Congress, 1998, pp. 554–560
I. Goldberg, D. Wagner, “TAZ Servers and the Rewebber Network”, http://www.cs.berkeley.edu/daw/classes/cs268/taz-www/rewebber.html
D. Kesdogan, R. Büschkes, O. Spaniol, “Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System”, pp. 365–380, in “G. Müller, K. Rannenberg (Eds.): Multilateral Security for Global Communication — Technology, Application, Business”, Addison-Wesley-Longman, 1999
D. Kesdogan, J. Egner, R. Büschkes, “Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System”, Proceedings of the Second Workshop on Information Hiding (IHW98), Portland, Oregon, USA, LNCS 1525, Springer
G. Müller, K. Rannenberg (Eds.): “Multilateral Security for Global Communication — Technology, Application, Business”, Addison-Wesley-Longman, 1999
A. Pfitzmann, M. Waidner, “Networks without User Observability”, Computers & Security, Vol. 6 (1987), pp. 158–166
A. Pfitzmann, M. Köhntopp, “Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology”, International Workshop on Design Issues in Anonymity and Unobservability, 2001, LNCS 2009, pp. 1–9
Remailer: http://www.obscura.com/loki/
Rewebber: http://www.rewebber.com/
R.L. Rivest, A. Shamir, L.M. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communication of the ACM, Vol. 21, No. 2, pp. 120–126
A. Shamir, “How to Share a Secret”, Communication of the ACM, Vol. 24, No. 11,Nov. 1979, pp. 612–613
A. Shamir, “Identity-Based Cryptosystems and Signature Schemes”, Advances in Cryptology — Crypto 84, pp. 47–53
C. Shields, B. Neil Levine, “A Protocol for Anonymous Communication Over the Internet”, ACM — CCS: Conference on Computer and Communication Security, 2000, pp. 33–42
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Demuth, T. (2002). Establishing Bilateral Anonymous Communication in Open Networks. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds) Security in the Information Society. IFIP Advances in Information and Communication Technology, vol 86. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35586-3_26
Download citation
DOI: https://doi.org/10.1007/978-0-387-35586-3_26
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1026-7
Online ISBN: 978-0-387-35586-3
eBook Packages: Springer Book Archive