Skip to main content

Anonymous Transactions in Computer Networks

(Extended Abstract)

  • Conference paper
Stabilization, Safety, and Security of Distributed Systems (SSS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5873))

Included in the following conference series:

Abstract

We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

In both schemes the authority provides each user with a unique random string. A player U may produce unique user name and password for each other player S using a one way function over the random string and the IP address of S. The player does not have to maintain any information in order to reproduce the user name and password used for accessing a player S. Moreover, the player U may execute transactions with a group of players S U in two phases; in the first phase the player interacts with each server without revealing information concerning its identity and without possibly identifying linkability among the servers in S U. In the second phase the player allows linkability and therefore transaction commitment with all servers in S U, while preserving anonymity (for future transactions).

Partially supported by Deutsche Telekom, Rita Altura Trust Chair in Computer Sciences, Lynne and William Frankel Center for Computer Sciences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bach, E., Shallit, J.: Algorithmic Number Theory. Efficient Algorithms, vol. 1. MIT Press, Cambridge (1996)

    MATH  Google Scholar 

  2. Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: Non-Interactive Anonymous Credentials. IACR Cryptology ePrint Archive, Report 2007/384

    Google Scholar 

  3. Camenisch, J., Lysyanskaya, A.: A Formal Treatment of Onion Routing. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 169–187. Springer, Heidelberg (2005)

    Google Scholar 

  4. Camenisch, J., Lysyanskaya, A.: Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 61. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Camenisch, J., Michels, M.: Proving in Zero Knowledge that a Number is the Product of Two Safe Primes. Basic Research in Computer Science (BRICS) Report Series (1998)

    Google Scholar 

  6. Cooperative Computing Awards, http://w2.eff/org/awards/coop.php

  7. Beimel, A., Dolev, S.: Buses for Anonymous Message Delivery. Journal of Cryptology 16, 25–39 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  8. Dolev, S., Ostrovsky, R.: Xor-Trees for Efficient Anonymous Multicast and Reception. ACM Transactions on Information and System Security 3(2), 63–84 (2000)

    Article  Google Scholar 

  9. Dolev, S., Kopeetsky, M.: Anonymous Transactions in Computer Networks. Department of Computer Science, Ben Gurion University of the Negev, Technical Report, Number 09-04 (2009)

    Google Scholar 

  10. Feige, U., Fiat, A., Shamir, A.: Zero-Knowledge Proofs of Identity. Journal of Cryptology 1(2) (1988)

    Google Scholar 

  11. Gabber, E., Gibbons, P., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318. Springer, Heidelberg (1997)

    Google Scholar 

  12. Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-encryption for Mixnets. In: The Cryptographer’s Track at RSA conference, San Francisco, CA, USA, pp. 163–178 (2004)

    Google Scholar 

  13. Goldreich, O.: Foundations of Cryptography, vol. 1. Cambridge University Press, Cambridge (2003)

    Google Scholar 

  14. Goldreich, O.: Foundations of Cryptography, vol. 2. Cambridge University Press, Cambridge (2003)

    Google Scholar 

  15. Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11) (1981)

    Google Scholar 

  16. Lee, T.V., Nguyen, K.Q., Varadharajan, V.: How to Prove that a Committed Number is Prime. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 208–218. Springer, Heidelberg (1999)

    Google Scholar 

  17. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym Systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  18. Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect Zero-Knowledge Arguments for NP Using any One-Way Permutation. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 196–214. Springer, Heidelberg (1993)

    Google Scholar 

  19. Stallings, W.: Network Security Essentials: Applications and Standards. Prentice Hall, Englewood Cliffs (2007)

    Google Scholar 

  20. Stingson, D.R.: Cryptography. Theory and Practice, 3rd edn. Chapman and Hall/CRC, Boca Raton (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dolev, S., Kopeetsky, M. (2009). Anonymous Transactions in Computer Networks. In: Guerraoui, R., Petit, F. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2009. Lecture Notes in Computer Science, vol 5873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05118-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05118-0_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05117-3

  • Online ISBN: 978-3-642-05118-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics