Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Anonymous attribute certificates based on traceable signatures

Anonymous attribute certificates based on traceable signatures Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and unlinkable access to web resources based on the privileges that users hold. Moreover, the scheme allows for anonymity revocation and tracing of unlinkable accesses. Research limitations/implications – The power of the attribute authority should be divided into several entities, one of them being a trusted third party, to avoid illicit disclosing of information. Practical implications – New systems with support for anonymous access to web resources can be developed. Originality/value – This paper adds the unlinkability property to anonymous accesses together with a tracing facility to existing proposals. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Internet Research Emerald Publishing

Anonymous attribute certificates based on traceable signatures

Internet Research , Volume 16 (2): 20 – Mar 1, 2006

Loading next page...
 
/lp/emerald-publishing/anonymous-attribute-certificates-based-on-traceable-signatures-ShsCEqtDj3

References (22)

Publisher
Emerald Publishing
Copyright
Copyright © 2006 Emerald Group Publishing Limited. All rights reserved.
ISSN
1066-2243
DOI
10.1108/10662240610656474
Publisher site
See Article on Publisher Site

Abstract

Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and unlinkable access to web resources based on the privileges that users hold. Moreover, the scheme allows for anonymity revocation and tracing of unlinkable accesses. Research limitations/implications – The power of the attribute authority should be divided into several entities, one of them being a trusted third party, to avoid illicit disclosing of information. Practical implications – New systems with support for anonymous access to web resources can be developed. Originality/value – This paper adds the unlinkability property to anonymous accesses together with a tracing facility to existing proposals.

Journal

Internet ResearchEmerald Publishing

Published: Mar 1, 2006

Keywords: Internet; Privacy

There are no references for this article.