Anonymous Subscription Protocols

نویسندگان

  • Zulfikar Ramzan
  • Matthias Ruhl
چکیده

In this paper we discuss protocols that allow a user to subscribe to an electronic service, and then anonymously access the service. That is, the provider does not know who accesses the service at any time, and moreover he cannot link two accesses to the same person. On the other hand, the supplier obtains proof that the user is authorized to access the service. We formally define the problem, give practical examples, and discuss the security features these protocols should have. An important property for a protocol is termination: the access privileges can be used only a fixed number of times. In this paper, we state and analyze two practical schemes which are the first to have this property while maintaining anonymity and unlinkability. The protocols also achieve lower storage and communication requirements than related schemes. One protocol uses blind signatures, while the other is based on a group signature scheme. The analysis includes identifying a new equivalent variant of the Decisional Diffie-Hellman security assumption, which may be of independent interest. Key-Words: Subscription/rental services, group signatures, anonymity, blind signatures, authentication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Publish-Subscribe Systems

Publish-subscribe protocols offer a unique means of data distribution, that has many applications for distributed systems. These protocols enable message delivery based on subscription rather than specific addressing; meaning a message is addressed by a subject string rather than to a specific recipient. Recipients may then subscribe to subjects they are interested in receiving using a variety ...

متن کامل

Protocols for Anonymous Subscription Services

In this paper we discuss protocols that allow a user to subscribe to an electronic service, and then anonymously access the service. That is, neither the service provider nor anyone else knows who accesses the service at any time, and moreover no one can link two accesses to the same person. On the other hand, the provider obtains proof that the user is authorized to use the service. We formall...

متن کامل

Lightweight Protection Against Inflated Subscription in Multicast Congestion Control

Group membership regulation is a useful mechanism for multicast congestion control: RLM, RLC, FLID-DL, and WEBRC form a promising line of multi-group protocols where receivers provide no feedback to the sender but control congestion via group subscription. Unfortunately, the group subscription mechanism also offers receivers an opportunity to elicit self-beneficial bandwidth allocations. In par...

متن کامل

Anonymous Publish/Subscribe in P2P Networks

One of the most important issues to deal with in peerto-peer networks is how to disseminate information. In this paper, we use a completely new approach to solving the information dissemination problem. Our approach uses the publish/subscribe paradigm. The publish/subscribe method is the most inclusive strategy to establish communication between the information providers (publishers) and the in...

متن کامل

An Agent-Based Model of Anonymous Communication Protocols

So far various anonymous communication protocols have been proposed independently and aimed at different situations. As a result, it is hard to understand the essential structures of those protocols and each protocol must be evaluated and implemented independently. To solve these problems, we propose an anonymous communication model that can represent a wide variety of anonymous protocols. In o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000