Abstract
One measure to provide anonymity for the users of a communication network are mixes whose usage was proposed in several applications recently. However, in practice such concepts are not widely used. One reason may be that the payment for providers, who commercially offer such mix-mediated anonymity service, has not been considered yet. We present detailed protocols for payment schemes that allow anonymous, secure payment of a mix-mediated anonymity service. The schemes aim to achieve confidentiality and integrity for all the user, the provider and the bank.
Parts of this work were supported by the German Science Foundation (DFG) and the Gottlieb Daimler-and Karl Benz-Foundation.
We want to thank Guntram Wicke, Prof. Dr. Andreas Pfitzmann and Andreas Graubner for many helpful discussions.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
David Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”, Communications of the ACM 24/2 (1981) 84–88.
L. Cottrell, “Mixmaster and Remailer Attacks”, http://www.obscura.com/~loki/remailer/remailer-essay.html.
Andreas Pfitzmann, Birgit Pfitzmann and Michael Waidner, “ISDN-MIXes Untraceable Communication with Very Small Bandwidth Overhead”, 7th IFIP International Conference on Information Security (IFIP/SEC’91), Elsevier, Amsterdam 1991.
David Goldschlag, Michael Reed and Paul Syverson, “Hiding Routing Information”, Workshop on Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 137–150.
C. Gülcü and G. Tsudik, “Mixing E-mail with BABEL”, ISOC Symposium on Network and Distributed System Security, 1996, 2–16.
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, and Andreas Pfitzmann, “Location management strategies increasing privacy in mobile communication”, 12th IFIP International Conference on Information Security (IFIP/SEC96), Chapman & Hall, London 1996, 39–48.
T. Lopatic, C. Eckert, and U. Baumgarten, “MMIP — Mixed Mobile Internet Protocol”, CMS 97 — Communications and Multimedia Security, IFIP TC-6 and TC-11, 22–23 Sept. 1997 in Athens (Greece).
E. Franz, A. Jerichow, and G. Wicke, “Payment Scheme for Mixes Providing Anonymity”, International IFIP Working Conference on Electronic Commerce 98; June 4–5th 1998, LNCS 1402, Springer-Verlag, Berlin 1998, 94–108.
Andreas Pfitzmann and Michael Waidner, “Networks Without User Observability”, Computers & Security 6/2, 158–166, February 1987.
E. Franz, A. Graubner, A. Jerichow, and A. Pfitzmann, “Modelling mix-mediated anonymous communication and preventing pool-mode attacks”, 14th IFIP International Conference on Information Security (IFIP/SEC’98), Chapman & Hall, London 1998.
Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, (2nd ed.) New York 1996.
Torben P. Pedersen “Electronic Payments of Small Amounts”, Security Protocols 1996, LNCS 1189, Springer-Verlag, Berlin 1997, 59–68.
Anja Jerichow, Jan Müller, Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner, “Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol”, IEEE Journal on Selected Areas in Communications, Special issue “Copyright and privacy protection”, 4(1998).
E. Franz, A. Graubner, A. Jerichow, and A. Pfitzmann, “Comparison of commitment schemes used in mix-mediated anonymous communication for preventing pool-mode attacks”, Australasian Conference on Information Security and Privacy (ACISP’98) in Brisbane, LNCS, Springer-Verlag.
Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig MjØlsnes, Frank Müller, Torben Pedersen, Birgit Pfitzmann, Cristian Radu, Peter de Rooij, Berry Schoenmakers, and Matthias Schunter, “Functionality of the Basic Protocols”, CAFE Public Report IHS8341, CWI Amsterdam, October 7, 1995; CAFE (Esprit 7023) Deliverable IHS 8341 (confidential), September 1,1995.
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner, “Trusting Mobile User Devices and Security Modules”, Computer 30/2 (1997) 61–68.
David Chaum, “Design Concepts for Tamper Responding Systems”, Crypto ’83, Plenum Press, New York 1984, 387–392.
David Chaum, “Blind Signatures for untraceable payments”, Crypto ’82, Plenum Press, New York 1983, 199–203.
Paul F. Syverson, David M. Goldschlag, and Michael G. Reed, “Anonymous Connections and Onion Routing”, IEEE Symposium on Security and Privacy, IEEE Computer Press, 1997, 44–54.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Franz, E., Jerichow, A. (1998). A mix-mediated anonymity service and its payment. In: Quisquater, JJ., Deswarte, Y., Meadows, C., Gollmann, D. (eds) Computer Security — ESORICS 98. ESORICS 1998. Lecture Notes in Computer Science, vol 1485. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055872
Download citation
DOI: https://doi.org/10.1007/BFb0055872
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65004-1
Online ISBN: 978-3-540-49784-4
eBook Packages: Springer Book Archive