Abstract
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technologies. The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it profitable. The governments or non-profit organisations must therefore run such systems or at least promote their further development and deployment. Especially governments have however conflicting interests: While governments of democratic nations are responsible to keep the freedom of citizens (and privacy as a part of it), governments also need instruments to prosecute criminal activities. Subsequently, Privacy Enhancing Technologies have to consider law enforcement functionality in order to balance these different targets.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, pseudonymity, and identity management – A proposal for terminology (2000-2004), http://dud.inf.tu-dresden.de/Literatur_V1.shtml
Hes, R., Borking, J.J. (eds.): Privacy Enhancing Technologies: The path to anonymity. revised edition, A&V 10, The Hague (1998)
Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. CACM 21, 120–126 (1978) reprinted: 96-99, (January 26, 1983)
Chaum, D.: Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. Communications of the ACM 24, 84–88 (1981)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Rivest, R.L., Sherman, A., Chaum, D. (eds.) Advances in Cryptology 1981 - 1997, pp. 199–203. Plenum Press, New York (1983)
Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28 (1985)
Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1, 65–75 (1988)
Bürk, H., Pfitzmann, A.: Value exchange systems enabling security and unobservability. Computers & Security 9, 715–721 (1990)
Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead. In: Proc. Kommunikation in verteilten Systemen (KiVS), pp. 451–463. Springer, Berlin (1991); IFB 267
Cooper, D.A., Birman, K.P.: Preserving privacy in a network of mobile computers. In: 1995 IEEE Symposium on Research in Security and Privacy, pp. 26–38. IEEE Computer Society Press, Los Alamitos (1995), http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR85-1490
Cottrell, L.: Mixmaster & Remailer Attacks (1995), http://www.obscura.com/~loki/remailer-essay.html
Federrath, H., Jerichow, A., Pfitzmann, A.: Mixes in Mobile Communication Systems: Location Management with Privacy. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 121–135. Springer, Heidelberg (1996)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. DIMACS Technical Report 97 (1997)
Kesdogan, D., Egner, J., Büschkes, R.: Stop-and-go-mIXes providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 83–98. Springer, Heidelberg (1998)
Berthold, O., Federrath, H., Köhntopp, M.: Project Anonymity and Unobservability in the Internet. In: Proc. Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000, Toronto/Canada, April 4–7. Association for Computing Machinery, pp. 57–65. ACM, New York (2000) ISBN 1-58113-256-5
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)
The Free Haven Project: Anonymity bibliography (2005), http://www.freehaven.net/anonbib/
JAP: The JAP Anonymity & Privacy Homepage (2000-2005), http://www.anon-online.de
TOR: An anonymous Internet communication system (2004), http://tor.eff.org/
Golembiewski, C., Hansen, M., Steinbrecher, S.: Experiences running a web anonymising service. In: Proc. 14th Intl. Workshop on Database and Expert Systems Applications (DEXA 2003), Prague, Czech Republic, pp. 482–486. IEEE Computer Society, Los Alamitos (2003)
Spiekermann, S.: Die Konsumenten der Anonymität – Wer nutzt Anonymisierungsdienste? Datenschutz und Datensicherheit DuD 27, 150–154 (2003)
Spiekermann, S.: The desire for privacy: Insights into the views and nature of the early adopters of privacy services. International Journal of Technology and Human Interaction 1 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Federrath, H. (2005). Privacy Enhanced Technologies: Methods – Markets – Misuse. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_1
Download citation
DOI: https://doi.org/10.1007/11537878_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28224-2
Online ISBN: 978-3-540-31796-8
eBook Packages: Computer ScienceComputer Science (R0)