Anonymous Subscription Protocols
نویسندگان
چکیده
In this paper we discuss protocols that allow a user to subscribe to an electronic service, and then anonymously access the service. That is, the provider does not know who accesses the service at any time, and moreover he cannot link two accesses to the same person. On the other hand, the supplier obtains proof that the user is authorized to access the service. We formally define the problem, give practical examples, and discuss the security features these protocols should have. An important property for a protocol is termination: the access privileges can be used only a fixed number of times. In this paper, we state and analyze two practical schemes which are the first to have this property while maintaining anonymity and unlinkability. The protocols also achieve lower storage and communication requirements than related schemes. One protocol uses blind signatures, while the other is based on a group signature scheme. The analysis includes identifying a new equivalent variant of the Decisional Diffie-Hellman security assumption, which may be of independent interest. Key-Words: Subscription/rental services, group signatures, anonymity, blind signatures, authentication.
منابع مشابه
Anonymous Publish-Subscribe Systems
Publish-subscribe protocols offer a unique means of data distribution, that has many applications for distributed systems. These protocols enable message delivery based on subscription rather than specific addressing; meaning a message is addressed by a subject string rather than to a specific recipient. Recipients may then subscribe to subjects they are interested in receiving using a variety ...
متن کاملProtocols for Anonymous Subscription Services
In this paper we discuss protocols that allow a user to subscribe to an electronic service, and then anonymously access the service. That is, neither the service provider nor anyone else knows who accesses the service at any time, and moreover no one can link two accesses to the same person. On the other hand, the provider obtains proof that the user is authorized to use the service. We formall...
متن کاملLightweight Protection Against Inflated Subscription in Multicast Congestion Control
Group membership regulation is a useful mechanism for multicast congestion control: RLM, RLC, FLID-DL, and WEBRC form a promising line of multi-group protocols where receivers provide no feedback to the sender but control congestion via group subscription. Unfortunately, the group subscription mechanism also offers receivers an opportunity to elicit self-beneficial bandwidth allocations. In par...
متن کاملAnonymous Publish/Subscribe in P2P Networks
One of the most important issues to deal with in peerto-peer networks is how to disseminate information. In this paper, we use a completely new approach to solving the information dissemination problem. Our approach uses the publish/subscribe paradigm. The publish/subscribe method is the most inclusive strategy to establish communication between the information providers (publishers) and the in...
متن کاملAn Agent-Based Model of Anonymous Communication Protocols
So far various anonymous communication protocols have been proposed independently and aimed at different situations. As a result, it is hard to understand the essential structures of those protocols and each protocol must be evaluated and implemented independently. To solve these problems, we propose an anonymous communication model that can represent a wide variety of anonymous protocols. In o...
متن کامل