loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Daniel Slamanig 1 ; Peter Schartner 2 and Christian Stingl 1

Affiliations: 1 Carinthia University of Applied Sciences, Austria ; 2 Institute of Applied Informatics, Austria

ISBN: 978-989-674-005-4

Keyword(s): Anonymity, Anonymous identification, Authentication, Privacy protection, Public key cryptography, Smart cards.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Insider Threats and Countermeasures ; Public Key Crypto Applications

Abstract: Internet privacy is of increasing interest, since online services are getting more and more ubiquitous and cover many aspects of one’s daily life. Hence users leave information tracks and disclose information during usage of services which can be compiled by third parties to infer users behavior, preferences etc. and thus may violate user’s privacy. In this paper we propose a practical method for traceable anonymous identification which can be used for online services in order to protect user’s privacy. It enables users to authenticate themselves to a service provider, whereas the service provider is not able to identify authenticating users. However, the service provider can be sure that only authorized users are able to authenticate. Since absolute anonymity may open the door for dishonest behavior, our protocol incorporates traceability, which enables a service provider to identify authenticating users in cooperation with an offline trusted third party. The proposed method is fully compatible with real world scenarios, i.e. public key infrastructures based on X.509 certificates, and can be easily deployed using state of the art smart cards. Furthermore, the proposed method is very efficient and we give a performance analysis as well as a security analysis of the introduced protocols. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.167.95.51

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Slamanig D., Schartner P. and Stingl C. (2009). PRACTICAL TRACEABLE ANONYMOUS IDENTIFICATION.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 225-232. DOI: 10.5220/0002217502250232

@conference{secrypt09,
author={Daniel Slamanig and Peter Schartner and Christian Stingl},
title={PRACTICAL TRACEABLE ANONYMOUS IDENTIFICATION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={225-232},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002217502250232},
isbn={978-989-674-005-4},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - PRACTICAL TRACEABLE ANONYMOUS IDENTIFICATION
SN - 978-989-674-005-4
AU - Slamanig D.
AU - Schartner P.
AU - Stingl C.
PY - 2009
SP - 225
EP - 232
DO - 10.5220/0002217502250232

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.