A security model for anonymous credential systems

被引:5
|
作者
Pashalidis, A [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, London NW1 4NS, England
关键词
anonymous credential systems; pseudonym systems; privacy; anonymity; unlinkability; provable security;
D O I
10.1007/1-4020-8145-6_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a formal model of the Bellare-Rogaway type [Bellare and Rogaway, 1994] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. The model abstracts away from how a specific instance of anonymous credential system achieves its goals; instead it defines what these goals are. The notions of credential unforgeability, non-transferability, pseudonym unlinkability and pseudonym owner protection are formally defined and the relationships between them are explored. The model is a step towards a formal treatment of the level of privacy protection that anonymous credential systems can and should achieve, both in terms of pseudonym unlinkability and user anonymity.
引用
收藏
页码:183 / 199
页数:17
相关论文
共 50 条
  • [1] Vulnerabilities in Anonymous Credential Systems
    Bhaskar, R.
    Chandrasekaran, K.
    Lokam, S. V.
    Montgomery, P. L.
    Venkatesan, R.
    Yacobi, Y.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 141 - 148
  • [2] Security analysis and fix of an anonymous credential system
    Yang, YJ
    Bao, F
    Deng, RH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 537 - 547
  • [3] Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems
    Loh, Jia-Chng
    Guo, Fuchun
    Susilo, Willy
    [J]. COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [4] Dynamic Anonymous Credential Systems With Controllable Anonymity and Unlinkability
    Hwang, Jung Yeon
    [J]. IEEE ACCESS, 2023, 11 : 142015 - 142029
  • [5] Verifying Anonymous Credential Systems in Applied Pi Calculus
    Li, Xiangxi
    Zhang, Yu
    Deng, Yuxin
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 209 - +
  • [6] Privacy Preserving Data Mining within Anonymous Credential Systems
    Kiayias, Aggelos
    Xu, Shouhuai
    Yung, Moti
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 57 - +
  • [7] Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
    Dietrich, Kurt
    Winter, Johannes
    Luzhnica, Granit
    Podesser, Siegfried
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 45 - 58
  • [8] An efficient anonymous credential system
    Akagi, Norio
    Manabe, Yoshifumi
    Okamoto, Tatsuaki
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 272 - 286
  • [9] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Fathi, Hanane
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 54 (01) : 225 - 236
  • [10] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Hanane Fathi
    SeongHan Shin
    Kazukuni Kobara
    Hideki Imai
    [J]. Wireless Personal Communications, 2010, 54 : 225 - 236