Skip to main content

An Anonymity Revocation Technology for Anonymous Communication

  • Chapter
  • First Online:
Information Systems Development

Abstract

A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Antoniou, G., Gritzalis, S.: RPINA- Network Forensics Protocol Embedding Privacy Enhancing Technologies. In: Taguchi, A. (ed.): International Symposium on Communications and Information Technologies. IEEE Press, Bangkok, Thailand (2006)

    Google Scholar 

  2. Antoniou, G., Jancic, A., Parampalli, U., Sterling, L.: Applying a cryptographic scheme in the RPINA protocol. Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on (2007) 65–74

    Google Scholar 

  3. Antoniou, G., Sterling, L., Gritzalis, S., Udaya, P.: Privacy and Forensics Investigation Process: The ERPINA Protocol. Computer Standard Interfaces 30(2008)229–236

    Article  Google Scholar 

  4. Argyrakis, J., Gritzalis, S., Kioulafas, C.: Privacy Enhancing Technologies: A Review. Electronic Government (2003) 282–287

    Google Scholar 

  5. Bellin, D.: Who Holds the Keys? The US Government & Cryptography Policy. Computer and Society 24(1994) 6–7

    Google Scholar 

  6. Boyan, J.: The Anonymizer: Protecting User Privacy on the Web. Computer-Mediated Communication Magazine 4(1997)

    Google Scholar 

  7. Burmester, M., Desmedt, Y., Wright, R.N., Yasinsac, A.: Accountable Privacy. Lecture Notes in Computer Science 3957(2006)83–95

    Article  Google Scholar 

  8. Chida, K., Shionoiri, O., Kanai, A.: Secure Anonymous Communications with Practical Anonymity Revocation Scheme. Advances in Information and Computer Security 4752(2007) 352–364

    Google Scholar 

  9. Claessens, J., Diaz, C., Goemans, C., Preneel, B., Vandewalle, J., Dumortier, J.: Revocable Anonymous Access to the Internet? Internet Research: Electronic Networking Applications and Policy 13(2003) 242–258

    Article  Google Scholar 

  10. Denning, D.E., Smid, M.: Key Escrowing Today. Communications Magazine, IEEE 32(1994) 58–68

    Google Scholar 

  11. Diaz, C., Preneel, B.: Accountable Anonymous Communication. Security, Privacy and Trust in Modern Data Management. Springer-Verlag (2006) 15

    Google Scholar 

  12. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Proceedings of the 13th Conference on USENIX Security Symposium-Volume 13 Table of Contents (2004) 21–21

    Google Scholar 

  13. Farkas, C., Ziegler, G., Meretei, A., Lörincz, A.: Anonymity and accountability in self-organizing electronic communities. Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society (2002) 81–90

    Google Scholar 

  14. Kopsell, S., Wendolsky, R., Federrath, H.: Revocable Anonymity. Proceedings of Emerging Trends in Information and Communication Security: International Conference, ETRICS (2006) 6–9

    Google Scholar 

  15. Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity and identity management— a consolidated proposal for terminology: 2008: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.31.pdf: Last Access–8th of May 2008

  16. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1998)66–92

    Article  Google Scholar 

  17. Ticar, K.: A Closer Look at Data Retention. International Journal of Technology Transfer and Commercialisation 6(2007) 87–99

    Article  Google Scholar 

  18. von Ahn, L., Bortz, A., Hopper, N.J., O’Neill, K.: Selectively Traceable Anonymity. Designing Privacy Enhancing Technologies, LNCS (pre-proceedings) (2006) 199–213

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Antoniou, G., Batten, L., Parampalli, U. (2009). An Anonymity Revocation Technology for Anonymous Communication. In: Papadopoulos, G., Wojtkowski, W., Wojtkowski, G., Wrycza, S., Zupancic, J. (eds) Information Systems Development. Springer, Boston, MA. https://doi.org/10.1007/b137171_34

Download citation

  • DOI: https://doi.org/10.1007/b137171_34

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-84809-9

  • Online ISBN: 978-0-387-84810-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics