Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version) pdfauthor
نویسندگان
چکیده
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow the selective deanonymization (or linking) of misbehaving users upon a complaint to a trusted third party (TTP). The ability of the TTP to revoke a user’s privacy at any time, however, is too strong a punishment for misbehavior. To limit the scope of deanonymization, systems such as “e-cash” have been proposed in which users are deanonymized under only certain types of well-defined misbehavior such as “double spending.” While useful in some applications, it is not possible to generalize such techniques to more subjective definitions of misbehavior. We present the first anonymous credential system in which services can “blacklist” misbehaving users without contacting a TTP. Since blacklisted users remain anonymous, misbehaviors can be judged subjectively without users fearing arbitrary deanonymization by a TTP. ∗This paper is the extended version of the paper to appear in CCS ’07 under the same title [TAKS07]. †This work was supported in part by the Institute for Security Technology Studies, under Grant number 2005DD-BX-1091 awarded by the Bureau of Justice Assistance, and the National Science Foundation, under grant CNS0524695. The views and conclusions do not necessarily represent those of the sponsors. ‡Department of Computer Science, Dartmouth College, Hanover, NH, USA §Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia ¶Institute for Security Technology Studies, Dartmouth College, Hanover, NH, USA
منابع مشابه
A PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users
Several anonymous authentication schemes allow servers to revoke a misbehaving user’s future accesses. Traditionally, these schemes have relied on powerful Trusted Third Parties (TTPs) capable of deanonymizing (or linking) users’ connections. Such TTPs are undesirable because users’ anonymity is not guaranteed, and users must trust them to judge ‘misbehavior’ fairly. Recent schemes such as Blac...
متن کاملBLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation
Anonymous authentication can give users the license to misbehave since there is no fear of retribution. As a deterrent or means to revocation, various schemes for accountable anonymity feature some kind of (possibly distributed) trusted third party (TTP) with the power to identify or link such misbehaving users. Recently, schemes such as BLAC, EPID, and PEREA showed how anonymous revocation can...
متن کاملDecentralized Blacklistable Anonymous Credentials with Reputation
Blacklistable anonymous credential systems provide service providers with a way to authenticate users according to their historical behaviors, while guaranteeing that all users can access services in an anonymous and unlinkable manner, thus are potentially useful in practice. Traditionally, to protect services from illegal access, the credential issuer, which completes the registration with use...
متن کاملNymble: Anonymous IP-Address Blocking pdfauthor
Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s success, however, has been limited by users employing this anonymity for abusive purposes, such as defacing Wikipedia. Website administrators rely on IPaddress blocking for disabling access to misbehaving users, but this is not pract...
متن کاملReview on Credential Systems in Anonymizing Networks
A credential system is a system in which users can obtain credentials from organizations and reveal possession of these credentials. This system is called anonymous when transactions carried out by the same user cannot be linked. In this paper we are describing few such credential systems. Nymble is a credential system in which servers themselves can blacklist misbehaving users, and thus blocks...
متن کامل