Skip to main content

Anonymity Protocol with Identity Escrow and Analysis in the Applied π-Calculus

  • Conference paper
Trustworthy Global Computing (TGC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4912))

Included in the following conference series:

  • 334 Accesses

Abstract

Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity if the service is misused. We introduce a new protocol in which the user’s identity is distributed among several token providers. Anonymity is assured provided at least one of the token providers is honest (and the misuse has not occurred). We analyse the protocol in the applied π-calculus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Harris interactive. In: IBM multi-national consumer privacy survey (October 1999)

    Google Scholar 

  2. Business Week/Harris poll: A growing threat. In: Business Week (March 2000)

    Google Scholar 

  3. Backes, M., Meadows, C., Mitchell, J.C.: Relating cryptography and formal methods: a panel. In: FMSE, pp. 61–66 (2003)

    Google Scholar 

  4. Camenisch, J., Lysyanskaya, A.: An identity escrow scheme with appointed verifiers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 388–407. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)

    Google Scholar 

  6. Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126–144. Springer, Heidelberg (2003)

    Google Scholar 

  7. Cranor, L.F., Reagle, J., Ackerman, M.: Beyond concern: Understanding net users’ attitudes about online privacy. Technical report, AT&T Labs-Research (1999)

    Google Scholar 

  8. Kiayias, A., Yung, M.: Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076 (2004), http://eprint.iacr.org/

  9. Kilian, J., Petrank, E.: Identity escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 169–187. Springer, Heidelberg (1998)

    Google Scholar 

  10. Leighton, F.T.: Failsafe key escrow systems. Technical Memo 483, MIT Laboratory for Computer Science (1994)

    Google Scholar 

  11. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  12. Marshall, L.F., Molina-Jiminez, C.: Anonymity with identity escrow. In: Dimitrakos, T., Martinelli, F. (eds.), Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust, pp. 121–129, Istituto di Informatica e Telematica, Pisa (2003)

    Google Scholar 

  13. Micali, S.: Fair public-key cryptosystems. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, Springer, Heidelberg (1993)

    Google Scholar 

  14. Mukhamedov, A., Ryan, M.D.: On anonymity with identity escrow. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2005. LNCS, vol. 3866, Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Aybek Mukhamedov and Mark D. Ryan. Anonymity protocol with identity escrow and analysis in the applied π-calculus (extended version) (2007), http://www.cs.bham.ac.uk/~axm,mdr

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gilles Barthe Cédric Fournet

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mukhamedov, A., Ryan, M.D. (2008). Anonymity Protocol with Identity Escrow and Analysis in the Applied π-Calculus. In: Barthe, G., Fournet, C. (eds) Trustworthy Global Computing. TGC 2007. Lecture Notes in Computer Science, vol 4912. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78663-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78663-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78662-7

  • Online ISBN: 978-3-540-78663-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics