An Anonymity Revocation Technology for Anonymous Communication
نویسندگان
چکیده
A number of Privacy Enhancing Technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad-hoc manner without a theoretical basis outlining the goals and underlying principles. In this paper we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.
منابع مشابه
How to Bypass Two Anonymity Revocation Schemes
In recent years, there have been several proposals for anonymous communication systems that provide intentional weaknesses to allow anonymity to be circumvented in special cases. These anonymity revocation schemes attempt to retain the properties of strong anonymity systems while granting a special class of people the ability to selectively break through their protections. We evaluate the two d...
متن کاملSolutions for Anonymous Communication on the Internet
This paper gives a short overview on the currently existing technical solutions for anonymous communication. The problem of anonymous communication is defined, and its basic solution is described. Practical solutions, mostly based on the basic scheme, are discussed. They provide anonymity to connections in general, and anonymity in specific applications, like email and the World Wide Web. The d...
متن کاملAccountable Anonymous Communication
In this chapter we motivate the need for anonymity at the communication layer and describe the potential risks of having traceable communications. We then introduce the legal requirements on data retention and motivate the need for revocability of anonymity upon the request of law enforcement. We describe the main building blocks for anonymous communication and for anonymity revocation. We expl...
متن کاملUser Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy
Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...
متن کاملRevocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this purpose, we propose a new privacy-friendly solution for incorporating revocation in an anonymous communication system. In contrast to other known methods, our scheme does not reveal the identity of a user to any othe...
متن کامل