loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: María Isabel González Vasco 1 ; Somayeh Heidarvand 2 and Jorge L. Villar 2

Affiliations: 1 Univ. Rey Juan Carlos, Spain ; 2 Univ. Politécnica de Cataluña, Spain

ISBN: 978-989-8425-18-8

Keyword(s): Anonymous authentication, Blind signatures, Clone detection, Traceability.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Information and Systems Security ; Privacy ; Public Key Crypto Applications ; Security and Privacy Policies

Abstract: In traditional e-cash systems, the tradeoff between anonymity and fraud-detection is solved by hiding the identity of the user into the e-coin, and providing an additional triggering mechanism that opens this identity in case of double spending. Hence, fraud detection implies loss of anonymity. This seems to be a somewhat natural solution when universality of the e-coin is required (i.e., the use of the coin is not determined at the time the coin is generated). However, much simpler protocols may suffice if we only want to prevent that payments for accessing certain services are over-used, even when users’ anonymity is perfectly preserved. In this paper we propose a simple and efficient Subscription Scheme, allowing a set of users to anonymously pay for and request access to different services offered by a number of service providers. In our approach, the use of the token is completely determined at issuing time, yet this final aim remains hidden to the issuing authority. Moreover, f raud detection here implies no loss of anonymity; as we make access tokens independent of the owner in a quite simple and efficient way. On the other hand, if different usages of the same token are allowed, these are fully traceable by the service providers. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.81.29.254

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
González Vasco M.; Heidarvand S.; L. Villar J. and (2010). ANONYMOUS SUBSCRIPTION SCHEMES - A Flexible Construction for On-line Services Access.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 120-131. DOI: 10.5220/0002973401200131

@conference{secrypt10,
author={María Isabel {González Vasco} and Somayeh Heidarvand and Jorge {L. Villar}},
title={ANONYMOUS SUBSCRIPTION SCHEMES - A Flexible Construction for On-line Services Access},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={120-131},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002973401200131},
isbn={978-989-8425-18-8},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - ANONYMOUS SUBSCRIPTION SCHEMES - A Flexible Construction for On-line Services Access
SN - 978-989-8425-18-8
AU - González Vasco, M.
AU - Heidarvand, S.
AU - L. Villar, J.
PY - 2010
SP - 120
EP - 131
DO - 10.5220/0002973401200131

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.