Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Anonymous transactions in computer networks

Anonymous transactions in computer networks Anonymous Transactions in Computer Networks SHLOMI DOLEV, Ben-Gurion University of the Negev MARINA KOPEETSKY, Sami-Shamoon College of Engineering We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user ™s anonymous authentication in distributed networks such as the Internet. We rst present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Both schemes assume that all the players interact over anonymous secure channels. Given authority that generates for each player hard to produce evidence EVID (e.g., problem instance with or without a solution) to each player, the identity of a user U is de ned by the ability to prove possession of aforementioned evidence. We use zero-knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft. In both schemes the authority provides each user with a unique random string. A player U may produce a unique user name and password for each other player S using a one-way function over the random string and http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM Transactions on Autonomous and Adaptive Systems (TAAS) Association for Computing Machinery

Loading next page...
 
/lp/association-for-computing-machinery/anonymous-transactions-in-computer-networks-7JxOEdkeRm

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 2012 by ACM Inc.
ISSN
1556-4665
DOI
10.1145/2240166.2240176
Publisher site
See Article on Publisher Site

Abstract

Anonymous Transactions in Computer Networks SHLOMI DOLEV, Ben-Gurion University of the Negev MARINA KOPEETSKY, Sami-Shamoon College of Engineering We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user ™s anonymous authentication in distributed networks such as the Internet. We rst present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Both schemes assume that all the players interact over anonymous secure channels. Given authority that generates for each player hard to produce evidence EVID (e.g., problem instance with or without a solution) to each player, the identity of a user U is de ned by the ability to prove possession of aforementioned evidence. We use zero-knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft. In both schemes the authority provides each user with a unique random string. A player U may produce a unique user name and password for each other player S using a one-way function over the random string and

Journal

ACM Transactions on Autonomous and Adaptive Systems (TAAS)Association for Computing Machinery

Published: Jul 1, 2012

There are no references for this article.