Skip to main content

Pseudonymity in the Light of Evidence-Based Trust

  • Conference paper
Security Protocols (Security Protocols 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3957))

Included in the following conference series:

Abstract

This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation systems are outlined first, followed by an introduction to the four families of the Common Criteria (for security evaluation) Privacy Class: Unobservability, Anonymity, Unlinkability, and Pseudonymity. The paper then discusses the common problem of many papers that narrow the considerations of privacy to anonymity only, and elaborates on the concept of pseudonymity through aspects of evidence storing, attacks and some of their implications, together with other related issues like use of mixes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acquisti, A., Dingledine, R., Syverson, P.F.: On the Economics of Anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84–102. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Anderson, R.J.: The Eternity Service. In: Proceedings of Pragocrypt 1996, Prague, Czech Republic, pp. 242–252 (1996)

    Google Scholar 

  3. Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. In: IEEE Pervasive Computing Magazine, pp. 52–61 (July-September 2003)

    Google Scholar 

  4. The Common Criteria Project Sponsoring Organisations: Common Criteria for Information Technology Security Evaluation - part 2, Version 2.1 (August 1999)

    Google Scholar 

  5. Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A Reputation System to Increase MIX-Net Reliability. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 126–141. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Dingledine, R., Mathewson, N., Syverson, P.: Reputation in Privacy Enhancing Technologies. In: Proceedings of the 12th annual conference on Computers, freedom and privacy, pp. 1–6. ACM Press, San Francisco (2002)

    Chapter  Google Scholar 

  7. Dingledine, R., Mathewson, N., Syverson, P.: Reputation in P2P Anonymity Systems. In: Workshop on Economics of Peer-To-Peer Systems, Berkeley, California (June 2003)

    Google Scholar 

  8. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Kinateder, M., Pearson, S.: A Privacy-Enhanced Peer-to-Peer Reputation System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Rezgui, A., Bouguettaya, A., Malik, Z.: A Reputation-Based Approach to Preserving Privacy in Web Services. In: Benatallah, B., Shan, M.-C. (eds.) TES 2003. LNCS, vol. 2819, pp. 91–103. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Serjantov, A., Danezis, G.: Towards an Information Theoretic Metric for Anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Shand, B., Dimmock, N., Bacon, J.: Trust for Ubiquitous, Transparent Collaboration. In: Proceedings of the First International Conference on Pervasive Computing and Communications, PerCom 2003, Texas, USA, pp. 153–160 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cvrček, D., Matyáš, V. (2006). Pseudonymity in the Light of Evidence-Based Trust. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2004. Lecture Notes in Computer Science, vol 3957. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11861386_31

Download citation

  • DOI: https://doi.org/10.1007/11861386_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40925-0

  • Online ISBN: 978-3-540-40926-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics