Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system....
Saved in:
| Published in | Emerging Trends in Information and Communication Security pp. 206 - 220 |
|---|---|
| Main Authors | , , |
| Format | Book Chapter |
| Language | English |
| Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2006
|
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783540346401 3540346406 |
| ISSN | 0302-9743 1611-3349 |
| DOI | 10.1007/11766155_15 |
Cover
| Abstract | Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system. In contrast to other known methods, our scheme does not reveal the identity of a user to any other entity involved in the revocation procedure but the law enforcement agency. Another advantage is, that no user will need to provide more identifying information than his connection (IP) address, that is what he needs to communicate with the system anyway. The proposed scheme is based mainly on threshold group signatures and threshold atomic proxy re-encryption. |
|---|---|
| AbstractList | Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system. In contrast to other known methods, our scheme does not reveal the identity of a user to any other entity involved in the revocation procedure but the law enforcement agency. Another advantage is, that no user will need to provide more identifying information than his connection (IP) address, that is what he needs to communicate with the system anyway. The proposed scheme is based mainly on threshold group signatures and threshold atomic proxy re-encryption. |
| Author | Federrath, Hannes Köpsell, Stefan Wendolsky, Rolf |
| Author_xml | – sequence: 1 givenname: Stefan surname: Köpsell fullname: Köpsell, Stefan email: sk13@inf.tu-dresden.de organization: Dresden University of Technology, Germany – sequence: 2 givenname: Rolf surname: Wendolsky fullname: Wendolsky, Rolf email: rolf.wendolsky@wiwi.uni-regensburg.de organization: University of Regensburg, Germany – sequence: 3 givenname: Hannes surname: Federrath fullname: Federrath, Hannes email: hannes.federrath@wiwi.uni-regensburg.de organization: University of Regensburg, Germany |
| BookMark | eNpVj0FLAzEUhJ9awbXuqX_Aq4et7-UlecmxFKtCoSB6XnY3iVTrrjQi9N-7ogedy8AMzPCdw6Qf-ggwI5wTolwTibVkTE3mCEovjo1G1lYrcwwFWaKKWfuTfx3SBApkVJUXzWdQ5vyCo5hEkytg9hA_h65pd_FyMf4d3rYfhws4Tc0ux_LXp_C0unlc3lXrze39crGuMqE2VWC24ilEZ4JFha6zaDR1NmAKnBpHjOjFSlLKUWwVpXYMhTvP0rHwFK5-dvP7fts_x33dDsNrrgnrb-D6DzB_AXZFQOQ |
| ContentType | Book Chapter |
| Copyright | Springer-Verlag Berlin Heidelberg 2006 |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2006 |
| DOI | 10.1007/11766155_15 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9783540346425 3540346422 |
| EISSN | 1611-3349 |
| Editor | Müller, Günter |
| Editor_xml | – sequence: 1 givenname: Günter surname: Müller fullname: Müller, Günter email: guenter.mueller@iig.uni-freiburg.de |
| EndPage | 220 |
| GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-s1045-d336791de85d60208c60541c6d0fd3fa813009767f2281eb21fba8173c937c373 |
| ISBN | 9783540346401 3540346406 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:57:01 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-s1045-d336791de85d60208c60541c6d0fd3fa813009767f2281eb21fba8173c937c373 |
| PageCount | 15 |
| ParticipantIDs | springer_books_10_1007_11766155_15 |
| PublicationCentury | 2000 |
| PublicationDate | 2006 |
| PublicationDateYYYYMMDD | 2006-01-01 |
| PublicationDate_xml | – year: 2006 text: 2006 |
| PublicationDecade | 2000 |
| PublicationPlace | Berlin, Heidelberg |
| PublicationPlace_xml | – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSubtitle | International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings |
| PublicationTitle | Emerging Trends in Information and Communication Security |
| PublicationYear | 2006 |
| Publisher | Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin Heidelberg |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Tygar, Dough Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, CA, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, MA, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Dough surname: Tygar fullname: Tygar, Dough organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany |
| SSID | ssj0000317418 ssj0002792 |
| Score | 1.3440632 |
| Snippet | Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of... |
| SourceID | springer |
| SourceType | Publisher |
| StartPage | 206 |
| SubjectTerms | Blind Signature Blind Signature Scheme Cryptographic Primitive Group Signature Scheme Signature Scheme |
| Title | Revocable Anonymity |
| URI | http://link.springer.com/10.1007/11766155_15 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA66IogH3_hmEW9LZZukaXvwoKIsunrQ9XFb0jY5La5sqwd_vTNN0nZVRL2UEtomzQyTyTfzTQg5lIrzkAaJR1UQeTxOqRdLDBfCrQxiTUWGbOTrG9G755dPwVNNISjZJUVylL5_yyv5j1ShDeSKLNk_SLb6KDTAPcgXriBhuH5yfqdhVoOjI3ESN_p1WqvlFhUuxXiK_WGh9aLC0K8wSH4qXnIbergrlK515RE-Oh5ZaPV2PNK105ipCehNicf0JNjpvKl3t-oNlkfkYxlkwXWIE6Ly476NWdyMizIVrOOOlXBW5kcYwsGQnR-qdFmUiXHB7ZuWuAVGGbY1xs4pY4cFVldkppqps61d0Vimacmh-7oCmKQPH-tegqs0xPoDs9Bvi8ydnF_2Hyr8DYwZFu6pVm0spGgiTmYwlgdUDlbMVxCZGbwleiIHs9HTl2B66aMMlski8lbaSCiB6VwhM-p5lSy56W3b6V0jq5WE2pWE1sn9xfngrOfZozG8HPbPgZcxJsLYz1QUZALPWU1hW8r9VGRdnTEtI4xSgqcZakojXyXU1wk0hiwFdzRlIdsgLehCbZI2GGiJic4-0yGPunHCUhEJqWWSRSKUdIscuL8aorLnQ1fpuvHr2795aIcs1JqzS1rF5FXtgUtXJPtWOh_-zkGL |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Emerging+Trends+in+Information+and+Communication+Security&rft.au=K%C3%B6psell%2C+Stefan&rft.au=Wendolsky%2C+Rolf&rft.au=Federrath%2C+Hannes&rft.atitle=Revocable+Anonymity&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540346401&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=206&rft.epage=220&rft_id=info:doi/10.1007%2F11766155_15 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |