Abstract
A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Antoniou, G., Gritzalis, S.: RPINA- Network Forensics Protocol Embedding Privacy Enhancing Technologies. In: Taguchi, A. (ed.): International Symposium on Communications and Information Technologies. IEEE Press, Bangkok, Thailand (2006)
Antoniou, G., Jancic, A., Parampalli, U., Sterling, L.: Applying a cryptographic scheme in the RPINA protocol. Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on (2007) 65–74
Antoniou, G., Sterling, L., Gritzalis, S., Udaya, P.: Privacy and Forensics Investigation Process: The ERPINA Protocol. Computer Standard Interfaces 30(2008)229–236
Argyrakis, J., Gritzalis, S., Kioulafas, C.: Privacy Enhancing Technologies: A Review. Electronic Government (2003) 282–287
Bellin, D.: Who Holds the Keys? The US Government & Cryptography Policy. Computer and Society 24(1994) 6–7
Boyan, J.: The Anonymizer: Protecting User Privacy on the Web. Computer-Mediated Communication Magazine 4(1997)
Burmester, M., Desmedt, Y., Wright, R.N., Yasinsac, A.: Accountable Privacy. Lecture Notes in Computer Science 3957(2006)83–95
Chida, K., Shionoiri, O., Kanai, A.: Secure Anonymous Communications with Practical Anonymity Revocation Scheme. Advances in Information and Computer Security 4752(2007) 352–364
Claessens, J., Diaz, C., Goemans, C., Preneel, B., Vandewalle, J., Dumortier, J.: Revocable Anonymous Access to the Internet? Internet Research: Electronic Networking Applications and Policy 13(2003) 242–258
Denning, D.E., Smid, M.: Key Escrowing Today. Communications Magazine, IEEE 32(1994) 58–68
Diaz, C., Preneel, B.: Accountable Anonymous Communication. Security, Privacy and Trust in Modern Data Management. Springer-Verlag (2006) 15
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Proceedings of the 13th Conference on USENIX Security Symposium-Volume 13 Table of Contents (2004) 21–21
Farkas, C., Ziegler, G., Meretei, A., Lörincz, A.: Anonymity and accountability in self-organizing electronic communities. Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society (2002) 81–90
Kopsell, S., Wendolsky, R., Federrath, H.: Revocable Anonymity. Proceedings of Emerging Trends in Information and Communication Security: International Conference, ETRICS (2006) 6–9
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity and identity management— a consolidated proposal for terminology: 2008: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.31.pdf: Last Access–8th of May 2008
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1998)66–92
Ticar, K.: A Closer Look at Data Retention. International Journal of Technology Transfer and Commercialisation 6(2007) 87–99
von Ahn, L., Bortz, A., Hopper, N.J., O’Neill, K.: Selectively Traceable Anonymity. Designing Privacy Enhancing Technologies, LNCS (pre-proceedings) (2006) 199–213
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Antoniou, G., Batten, L., Parampalli, U. (2009). An Anonymity Revocation Technology for Anonymous Communication. In: Papadopoulos, G., Wojtkowski, W., Wojtkowski, G., Wrycza, S., Zupancic, J. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/b137171_34
Download citation
DOI: https://doi.org/10.1007/b137171_34
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-84809-9
Online ISBN: 978-0-387-84810-5
eBook Packages: Computer ScienceComputer Science (R0)