Revocable Anonymity

Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system....

Full description

Saved in:
Bibliographic Details
Published inEmerging Trends in Information and Communication Security pp. 206 - 220
Main Authors Köpsell, Stefan, Wendolsky, Rolf, Federrath, Hannes
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2006
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783540346401
3540346406
ISSN0302-9743
1611-3349
DOI10.1007/11766155_15

Cover

Abstract Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system. In contrast to other known methods, our scheme does not reveal the identity of a user to any other entity involved in the revocation procedure but the law enforcement agency. Another advantage is, that no user will need to provide more identifying information than his connection (IP) address, that is what he needs to communicate with the system anyway. The proposed scheme is based mainly on threshold group signatures and threshold atomic proxy re-encryption.
AbstractList Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system. In contrast to other known methods, our scheme does not reveal the identity of a user to any other entity involved in the revocation procedure but the law enforcement agency. Another advantage is, that no user will need to provide more identifying information than his connection (IP) address, that is what he needs to communicate with the system anyway. The proposed scheme is based mainly on threshold group signatures and threshold atomic proxy re-encryption.
Author Federrath, Hannes
Köpsell, Stefan
Wendolsky, Rolf
Author_xml – sequence: 1
  givenname: Stefan
  surname: Köpsell
  fullname: Köpsell, Stefan
  email: sk13@inf.tu-dresden.de
  organization: Dresden University of Technology, Germany
– sequence: 2
  givenname: Rolf
  surname: Wendolsky
  fullname: Wendolsky, Rolf
  email: rolf.wendolsky@wiwi.uni-regensburg.de
  organization: University of Regensburg, Germany
– sequence: 3
  givenname: Hannes
  surname: Federrath
  fullname: Federrath, Hannes
  email: hannes.federrath@wiwi.uni-regensburg.de
  organization: University of Regensburg, Germany
BookMark eNpVj0FLAzEUhJ9awbXuqX_Aq4et7-UlecmxFKtCoSB6XnY3iVTrrjQi9N-7ogedy8AMzPCdw6Qf-ggwI5wTolwTibVkTE3mCEovjo1G1lYrcwwFWaKKWfuTfx3SBApkVJUXzWdQ5vyCo5hEkytg9hA_h65pd_FyMf4d3rYfhws4Tc0ux_LXp_C0unlc3lXrze39crGuMqE2VWC24ilEZ4JFha6zaDR1NmAKnBpHjOjFSlLKUWwVpXYMhTvP0rHwFK5-dvP7fts_x33dDsNrrgnrb-D6DzB_AXZFQOQ
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2006
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2006
DOI 10.1007/11766155_15
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783540346425
3540346422
EISSN 1611-3349
Editor Müller, Günter
Editor_xml – sequence: 1
  givenname: Günter
  surname: Müller
  fullname: Müller, Günter
  email: guenter.mueller@iig.uni-freiburg.de
EndPage 220
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s1045-d336791de85d60208c60541c6d0fd3fa813009767f2281eb21fba8173c937c373
ISBN 9783540346401
3540346406
ISSN 0302-9743
IngestDate Wed Sep 17 03:57:01 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1045-d336791de85d60208c60541c6d0fd3fa813009767f2281eb21fba8173c937c373
PageCount 15
ParticipantIDs springer_books_10_1007_11766155_15
PublicationCentury 2000
PublicationDate 2006
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 2006
PublicationDecade 2000
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings
PublicationTitle Emerging Trends in Information and Communication Security
PublicationYear 2006
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Tygar, Dough
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, CA, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, MA, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Dough
  surname: Tygar
  fullname: Tygar, Dough
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany
SSID ssj0000317418
ssj0002792
Score 1.3440632
Snippet Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of...
SourceID springer
SourceType Publisher
StartPage 206
SubjectTerms Blind Signature
Blind Signature Scheme
Cryptographic Primitive
Group Signature Scheme
Signature Scheme
Title Revocable Anonymity
URI http://link.springer.com/10.1007/11766155_15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA66IogH3_hmEW9LZZukaXvwoKIsunrQ9XFb0jY5La5sqwd_vTNN0nZVRL2UEtomzQyTyTfzTQg5lIrzkAaJR1UQeTxOqRdLDBfCrQxiTUWGbOTrG9G755dPwVNNISjZJUVylL5_yyv5j1ShDeSKLNk_SLb6KDTAPcgXriBhuH5yfqdhVoOjI3ESN_p1WqvlFhUuxXiK_WGh9aLC0K8wSH4qXnIbergrlK515RE-Oh5ZaPV2PNK105ipCehNicf0JNjpvKl3t-oNlkfkYxlkwXWIE6Ly476NWdyMizIVrOOOlXBW5kcYwsGQnR-qdFmUiXHB7ZuWuAVGGbY1xs4pY4cFVldkppqps61d0Vimacmh-7oCmKQPH-tegqs0xPoDs9Bvi8ydnF_2Hyr8DYwZFu6pVm0spGgiTmYwlgdUDlbMVxCZGbwleiIHs9HTl2B66aMMlski8lbaSCiB6VwhM-p5lSy56W3b6V0jq5WE2pWE1sn9xfngrOfZozG8HPbPgZcxJsLYz1QUZALPWU1hW8r9VGRdnTEtI4xSgqcZakojXyXU1wk0hiwFdzRlIdsgLehCbZI2GGiJic4-0yGPunHCUhEJqWWSRSKUdIscuL8aorLnQ1fpuvHr2795aIcs1JqzS1rF5FXtgUtXJPtWOh_-zkGL
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Emerging+Trends+in+Information+and+Communication+Security&rft.au=K%C3%B6psell%2C+Stefan&rft.au=Wendolsky%2C+Rolf&rft.au=Federrath%2C+Hannes&rft.atitle=Revocable+Anonymity&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540346401&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=206&rft.epage=220&rft_id=info:doi/10.1007%2F11766155_15
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon