Advertisement

Brief Announcement: Arbitrators in the Security Infrastructure

  • Shlomi Dolev
  • Niv Gilboa
  • Ofer Hermoni
Conference paper
  • 551 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7596)

Abstract

We introduce the notion of digital arbitration which enables resolving disputes between servers and users with the aid of arbitrators. Arbitrators are semi-trusted entities in a social network that facilitate communication or business transactions. The communicating parties, users and servers, agree before a communication transaction on a set of arbitrators that they trust (reputation systems may support their choice). Then, the arbitrators receive digital goods, e.g. a deposit, and a terms of use agreement between participants such that the goods of a participant are returned if and only if the participant acts according to the agreement.

Keywords

Secret Sharing Scheme Reputation System Security Infrastructure Anonymous Authentication Communication Transaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Au, M.H., Tsang, P.P., Kapadia, A., Susilo, W.: BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. Indiana University Technical Report TR695 (May 2011)Google Scholar
  2. 2.
    Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clone wars: efficient periodic n-times anonymous authentication. ACM CCS, 201–210 (2006)Google Scholar
  3. 3.
    Camenisch, J., Lysyanskaya, A.: Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer (2001)Google Scholar
  4. 4.
    Diaz, C., Preneel, B.: Accountable Anonymous Communication. In: Security, Privacy and Trust in Modern Data Management (2006)Google Scholar
  5. 5.
    Dolev, S., Gilboa, N., Hermoni, O.: Poster: arbitrators in the security infrastructure, supporting positive anonymity. In: CCS 2011, pp. 753–756 (2011)Google Scholar
  6. 6.
    Hoepman, J.H.: Revocable Privacy. ENISA Quarterly Review 5(2), 16–17 (2009)Google Scholar
  7. 7.
    Köpsell, S., Wendolsky, R., Federrath, H.: Revocable Anonymity. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 206–220. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Teranishi, I., Furukawa, J., Sako, K.: k-Times Anonymous Authentication (Extended Abstract). In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 308–322. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Tsang, P.P., Kapadia, A., Cornelius, C., Smith, S.W.: Nymble: Blocking misbehaving users in anonymizing networks. IEEE Trans. Dependable Sec. Comput. 8(2), 256–269 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Shlomi Dolev
    • 1
  • Niv Gilboa
    • 2
  • Ofer Hermoni
    • 3
  1. 1.Department of Computer SciencesBen-Gurion University of the NegevIsrael
  2. 2.Department of Communication Systems EngineeringBen-Gurion University of the NegevIsrael
  3. 3.Department of Information Systems EngineeringBen-Gurion University of the NegevIsrael

Personalised recommendations