Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

被引:2
|
作者
Fathi, Hanane [1 ]
Shin, SeongHan [2 ]
Kobara, Kazukuni [2 ]
Imai, Hideki [2 ,3 ]
机构
[1] Aalborg Univ, Ctr TeleInfrastuktur, DK-9220 Aalborg, Denmark
[2] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Chiyoda Ku, Tokyo 1010021, Japan
[3] Chuo Univ, Fac Sci & Engn, Bunkyo Ku, Tokyo 1128551, Japan
关键词
Anonymous communications; Mobile users; Anonymous signatures; Credential systems; IP anonymity;
D O I
10.1007/s11277-009-9715-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel to the credential server or establishing an anonymous channel using the time-consuming existing rerouting techniques; (2) provides authenticated anonymous access to privacy-related services without rerouting the packets; (3) helps combatting the abuse of anonymity for performing illegal activities (e.g. redistribution of copy-righted contents, illegal drug trading and so on).
引用
收藏
页码:225 / 236
页数:12
相关论文
共 50 条
  • [1] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Hanane Fathi
    SeongHan Shin
    Kazukuni Kobara
    Hideki Imai
    [J]. Wireless Personal Communications, 2010, 54 : 225 - 236
  • [2] Protocols for purpose-restricted anonymous communications in IP-based wireless networks
    Fathi, Hanane
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (15) : 3662 - 3671
  • [3] Vulnerabilities in Anonymous Credential Systems
    Bhaskar, R.
    Chandrasekaran, K.
    Lokam, S. V.
    Montgomery, P. L.
    Venkatesan, R.
    Yacobi, Y.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 141 - 148
  • [4] Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
    Dietrich, Kurt
    Winter, Johannes
    Luzhnica, Granit
    Podesser, Siegfried
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 45 - 58
  • [5] Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 198 - +
  • [6] A security model for anonymous credential systems
    Pashalidis, A
    Mitchell, CJ
    [J]. INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY, 2004, 148 : 183 - 199
  • [7] Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems
    Loh, Jia-Chng
    Guo, Fuchun
    Susilo, Willy
    [J]. COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [8] Anonymous communications for mobile agents
    Korba, L
    Song, R
    Yee, G
    [J]. MOBILE AGENTS FOR TELECOMMUNICATION APPLICATIONS, PROCEEDINGS, 2002, 2521 : 171 - 181
  • [9] Threshold BBS plus Signatures for Distributed Anonymous Credential Issuance
    Doerner, Jack
    Kondi, Yashvanth
    Lee, Eysa
    Shelat, Abhi
    Tyner, LaKyah
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 773 - 789
  • [10] Dynamic Anonymous Credential Systems With Controllable Anonymity and Unlinkability
    Hwang, Jung Yeon
    [J]. IEEE ACCESS, 2023, 11 : 142015 - 142029