Credential-based systems for the anonymous delegation of rights
نویسندگان
چکیده
An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities. The delegation procedure is anonymous, such that no collusion of entities can track an individual’s delegation behavior. On the other hand, it is ensured that a user cannot abuse her delegation capabilities. This paper introduces a general delegation model and presents three implementations. Our implementations are based on credential systems and provide both anonymity for the individual and security for the organizations. The implementations are compared based on their functionality, privacy and security characteristics. Additionally, some guidelines are given for choosing a particular implementation based on the application’s requirements. CR Subject Classification : E.3 [Data]: Data Encryption – Public key cryptosystems. Credential-based systems for the anonymous delegation of rights Liesje Demuynck Bart De Decker
منابع مشابه
A Credential-Based System for the Anonymous Delegation of Rights
An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities. The delegation procedure is anonymous, such that no collusion of entities can track an individual’s delegation behavior. On the other hand, it is ensured that a user cannot abuse her delegation capabilities. This paper introduces a general delegation mo...
متن کاملAnonymous Role-based Delegation With Group Signatures
We propose a decentralized trust management model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of his role without revealing his own identity. Anonymous delegation protects sensitive membership information of a delegator and hides the internal structure of an organization. Certificates used in anonymous role-based cascaded delega...
متن کاملRB-GDM: A Role-Based Grid Delegation Model
Grid delegation is the procedure by which a valid user endows another user or a program or service with the ability to act on that user’s behalf. Delegation is the primary form of authorization in grids. The large and geographically distributed, dynamic, heterogeneous and scalable grid environment poses unique delegation requirements. Presently there are no standard mechanisms to guide grid del...
متن کاملAn Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Rev...
متن کاملHomomorphic Proofs and Applications
This paper introduces and formalizes homomorphic proofs,which allow ’adding’ proofs and ’adding’ their statementsto get a new proof of the ’sum’ statement. We proposea construction of homomorphic proofs and show one of itsapplications which is a new accumulator scheme with del-egatable non-membership (NM) proofs. We use this accu-mulator in extending the BCCKLS scheme [3...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006