Privacy Enhancing Technologies for Privacy Enhancing Technologies

نویسنده

  • Claudia Eckert
چکیده

This work contributes to the field of unlinkability. Unlinkability describes a situation where attackers are unable to correctly cluster items of interest. The focus of this work is on modelling and measuring unlinkability. Additionally a protocol for provision of unlinkable certificates, tailored to the requirements of vehicular communication is introduced. The vehicular scenario is used throughout this work as a motivating example. In this work, a linkability graph is developed and used to illustrate the tight relation between unlinkability and anonymity in certification schemes. The main distinction between anonymity and unlinkability problems is captured by the notion of inner structure, which is developed in this work. Inner structure describes the inherent difference between hypotheses of unlinkability problems. This difference is expressed by metrics that reflect the attackers’ objectives and world-view. Inner structure motivates consistency of an attacker’s world-view as criterion for assessment of attacker quality. Previous entropy-based global unlinkability measures do not reflect the consistency of attacker probability mass assignments. In this work, these shortcomings are analysed, and criteria for unlinkability measures are developed. These criteria are then discussed for a new unlinkability measure introduced herein. This expected distance unlinkability measure is defined using the inner structure of a space of hypotheses. It thus reflects the consistency of an attacker’s assignment and not only the attacker’s certainty as done by entropy-based measures. This work also contributes a certification protocol that provides revocableanonymous protocols that are not linkable to each other or the authenticated requester by the issuing certification authority or others. Revocation of anonymity is possible only by a quorum of independent revocation authorities. The objective is to reduce the trust that has to be put into single authorities to reduce the risk of misuse. The protocol is based on a previously known cut-and-choose blind signature protocol, but made more flexible to suit vehicular communication scenarios. An extensive security analysis of newly introduced protocol-parameters is provided. Concluding, this work provides a contribution to the ongoing discussion on unlinkability, unlinkability measures and analysis. It draws motivation from a communication scenario that is intensively researched at the moment and contributes to the protocol development there.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-Enhancing Technologies for the Internet, II: Five Years Later

Five years ago, “Privacy-enhancing technologies for the Internet” [23] examined the state of the then newly emerging privacy-enhancing technologies. In this survey paper, we look back at the last five years to see what has changed, what has stagnated, what has succeeded, what has failed, and why. We also look at current trends with a view towards the future.

متن کامل

Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

It sounds good when knowing the privacy enhancing technologies 6th international workshop pet 2006 cambridge uk june 28 3

متن کامل

Privacy Enhanced Technologies: Methods - Markets - Misuse

Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technologies. The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it p...

متن کامل

A layered architecture for privacy - enhancing technologies

While a number of privacy-enhancing technologies have been proposed over the past quarter century, very little has been done to generalise the notion. Privacy-enhancing technologies have typically been discussed for specific applications (such as confidential and/or anonymous e-mail) or in specific contexts (such as on the Internet). This paper takes cognisance of existing privacy-enhancing tec...

متن کامل

Price Discrimination, Privacy Technologies, and User Acceptance

We discuss the relations between welfare enhancing price discrimination and privacy enhancing technologies, and the possible drivers of consumers’ and merchants’ acceptance of those technologies.

متن کامل

Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings

Why should wait for some days to get or receive the privacy enhancing technologies 9th international symposium pets 2009 seattle wa usa august 5 7 book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This privacy enhancing technologies 9th international...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010