Credential-based systems for the anonymous delegation of rights

نویسندگان

  • Liesje Demuynck
  • Bart De Decker
چکیده

An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities. The delegation procedure is anonymous, such that no collusion of entities can track an individual’s delegation behavior. On the other hand, it is ensured that a user cannot abuse her delegation capabilities. This paper introduces a general delegation model and presents three implementations. Our implementations are based on credential systems and provide both anonymity for the individual and security for the organizations. The implementations are compared based on their functionality, privacy and security characteristics. Additionally, some guidelines are given for choosing a particular implementation based on the application’s requirements. CR Subject Classification : E.3 [Data]: Data Encryption – Public key cryptosystems. Credential-based systems for the anonymous delegation of rights Liesje Demuynck Bart De Decker

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Credential-Based System for the Anonymous Delegation of Rights

An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities. The delegation procedure is anonymous, such that no collusion of entities can track an individual’s delegation behavior. On the other hand, it is ensured that a user cannot abuse her delegation capabilities. This paper introduces a general delegation mo...

متن کامل

Anonymous Role-based Delegation With Group Signatures

We propose a decentralized trust management model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of his role without revealing his own identity. Anonymous delegation protects sensitive membership information of a delegator and hides the internal structure of an organization. Certificates used in anonymous role-based cascaded delega...

متن کامل

RB-GDM: A Role-Based Grid Delegation Model

Grid delegation is the procedure by which a valid user endows another user or a program or service with the ability to act on that user’s behalf. Delegation is the primary form of authorization in grids. The large and geographically distributed, dynamic, heterogeneous and scalable grid environment poses unique delegation requirements. Presently there are no standard mechanisms to guide grid del...

متن کامل

An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health

Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Rev...

متن کامل

Homomorphic Proofs and Applications

This paper introduces and formalizes homomorphic proofs,which allow ’adding’ proofs and ’adding’ their statementsto get a new proof of the ’sum’ statement. We proposea construction of homomorphic proofs and show one of itsapplications which is a new accumulator scheme with del-egatable non-membership (NM) proofs. We use this accu-mulator in extending the BCCKLS scheme [3...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006