Abstract
This paper illustrates and scans the limits of the use of anonymous credentials (e.g. Idemix) on smart phones to preserve the user’s privacy. A prototypical application with strong privacy requirements, ePoll, will be presented in detail. To ease the implementation of such applications, a specialized identity management framework has been developed. A first prototype of the ePoll application was built for workstations. Later it was ported to a smart phone to evaluate the performance of anonymous credential protocols in this setting.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brands, S.: Technical overview of digital credentials (1999), http://citeseer.ist.psu.edu/brands02technical.html
Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system (2002), http://citeseer.ist.psu.edu/camenisch02design.html
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. ACM Commun. 28(10), 1030–1044 (1985)
De Decker, B., Lapon, J., Layouni, M., Mannadiar, R., Naessens, V., Vangheluwe, H., Verhaeghe, P., Verslype, K.: Adapid deliverable D12: Framework II (2009), https://www.cosic.esat.kuleuven.be/adapid/docs/Adapid_D12.pdf
The belgian electronic identity card, http://eid.belgium.be/
Kiayias, A.: An internet voting system supporting user privacy (2006), http://www.scientificcommons.org/42582861
Adida, B., de Marneffe, O., Pereira, O., Quisquater, J.-J.: Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios. In: Jefferson, T.M.D., Hall, J.L. (eds.) Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. USENIX (2009)
Diaz, C., Dekeyser, H., Kohlweiss, M., Nigusse, G.: Privacy preserving electronic petitions (2008), http://www.cosic.esat.kuleuven.be/publications/article-1053.pdf
Naessens, V., Demuynck, L., De Decker, B.: A fair anonymous submission and review system. In: Leitold, H., Markatos, E.P. (eds.) CMS 2006. LNCS, vol. 4237, pp. 43–53. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Verhaeghe, P., Verslype, K., Lapon, J., Naessens, V., De Decker, B. (2010). A Mobile and Reliable Anonymous ePoll Infrastructure. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 47. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17502-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-17502-2_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17501-5
Online ISBN: 978-3-642-17502-2
eBook Packages: Computer ScienceComputer Science (R0)