Filters








7,468 Hits in 7.6 sec

Accountable Anonymous E-Mail [chapter]

Vincent Naessens, Bart De Decker, Liesje Demuynck
2005 IFIP Advances in Information and Communication Technology  
Therefore, controlling abuse is as important as protecting the anonymity of legitimate users when designing anonymous applications.  ...  Current anonymous e-mail systems offer unconditional anonymity to their users which can provoke abusive behaviour.  ...  The mail system wants to offer a good service in order to attract users. Therefor, the mail system contracts its users to meet the requirements of their users. Limited use of resources.  ... 
doi:10.1007/0-387-25660-1_1 fatcat:o345rtv55bgslkbht5iumpiibi

Design and implementation of the idemix anonymous credential system

Jan Camenisch, Els Van Herreweghen
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by [6] .  ...  We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.  ...  Acknowledgements The authors are grateful to Marco Bove, Endre Bangerter, Roger Mathys, Martin Schaffer, and Dieter Sommer for their amazing Java programming making the idemix prototype reality.  ... 
doi:10.1145/586110.586114 dblp:conf/ccs/CamenischH02 fatcat:jt5wrnyx4bcpvoirtpcrk2yroq

Design and implementation of the idemix anonymous credential system

Jan Camenisch, Els Van Herreweghen
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by [6] .  ...  We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.  ...  Acknowledgements The authors are grateful to Marco Bove, Endre Bangerter, Roger Mathys, Martin Schaffer, and Dieter Sommer for their amazing Java programming making the idemix prototype reality.  ... 
doi:10.1145/586111.586114 fatcat:ymu6mapaorg67ayatynzeviesa

Privacy preserving electronic petitions

Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse
2008 Identity in the Information Society  
We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions.  ...  We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability of data protection legislation to our system.  ...  block for limiting the number of credential shows.  ... 
doi:10.1007/s12394-009-0012-8 fatcat:5iwfwrmvpfhxhjrrf5olfiu4pi

Anonymous, Yet Trustworthy Auctions [chapter]

Prasit Bikash Chanda, Vincent Naessens, Bart De Decker
2009 IFIP Advances in Information and Communication Technology  
Anonymity of bidders is required to conceal their business strategies from competitors.  ...  An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment.  ...  is partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, the Research Fund K.U.Leuven and the IWT-SBO Project (DiCoMAS) "Distributed Collaboration using  ... 
doi:10.1007/978-3-642-04280-5_19 fatcat:dsddwtinrzgxzhycsvbe3ro2bu

PriMan : A Privacy-Preserving Identity Framework [chapter]

Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker
2010 Lecture Notes in Computer Science  
It offers the application developer a uniform technology-agnostic interface to use and combine different types of privacy enhancing technologies.  ...  Moreover, the PriMan framework defines all the components and their functionality required to raise the development of privacy enhanced client-server applications to a higher level.  ...  Idemix credentials can be shown under a pseudonym to which the credential is not bound. The issuer of an Idemix credential can set a global limit on the number of times the credential can be used.  ... 
doi:10.1007/978-3-642-13739-6_24 fatcat:tauo3nrxhrhcnpiq5h66yum43y

Anonymous credentials with biometrically-enforced non-transferability

Russell Impagliazzo, Sara Miner More
2003 Proceeding of the ACM workshop on Privacy in the electronic society - WPES '03  
Using the model combining biometric authentication with anonymous credentials in the wallet-with-observer architecture proposed by Bleumer [4], we formalize the requirements of an anonymous credential  ...  We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication capabilities.  ...  To restrict the power of the credential granter somewhat, we would like to explore ways in which the credentials of only a limited number of users could be flagged so that they would no longer be anonymous  ... 
doi:10.1145/1005140.1005150 dblp:conf/wpes/ImpagliazzoM03 fatcat:lrhnbkyqafbmxocqamane2qs6u

Digital patient assistants: privacy vs cost in compulsory health insurance

G. Bleumer, M. Schunter
1998 Health Informatics Journal  
As an example, we consider the German health insurance system, and we discuss how the charging and clearing of medical services can be implemented so as to support both the legitimate privacy interests  ...  We also show how compulsory health insurers can use our solution to control their overall costs.  ...  We would like to thank the working group on security in hospital information systems of the German GMDS and in particular Bernd Blobel and Klaus Pommerening for their motivation and support of this work  ... 
doi:10.1177/146045829800400304 fatcat:feohtm5rfzbpxmuavqi4kvpnim

A Credential-Based System for the Anonymous Delegation of Rights [chapter]

Liesje Demuynck, Bart De Decker, Wouter Joosen
2007 IFIP International Federation for Information Processing  
An anonymous delegation system enables individuals to retrieve rights and to delegate different subparts of these rights to different entities.  ...  Our implementation is based on credential systems and provides both anonymity for the individual and security for the organizations.  ...  By employing limited-show credentials, it is possible to limit the number of times that a right can be shown to a verifier.  ... 
doi:10.1007/978-0-387-72367-9_15 fatcat:6ux2ctn3offn3pqdbwgfs6lcgy

Anonymity And Accountability In Web Based Transactions

H Jayasree
2012 Advanced Computing An International Journal  
The protection of users' privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services.  ...  Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E-transactions  ...  We have discussed the requirements, building blocks to provide anonymous communication.  ... 
doi:10.5121/acij.2012.3217 fatcat:5qu4guzzwjdtxkezb7fs47rgpi

A Privacy-Preserving Ticketing System [chapter]

Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe
2008 Lecture Notes in Computer Science  
This paper proposes two alternative ticketing systems that are using the eID card in a bootstrap procedure, but still are providing a high degree of privacy to the user.  ...  Electronic identity (eID) cards are deployed in an increasing number of countries.  ...  Properties will refer to the credential used in the proof. • D: (Nym, DeanProof) ← deanonymize(transcript, condition).  ... 
doi:10.1007/978-3-540-70567-3_8 fatcat:6cqmi3a22fdy7ewg5te4i3md7u

A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System [chapter]

Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype
2008 Lecture Notes in Computer Science  
The presented protocol relies on standard privacy-preserving credential systems, and verifiable public key cryptography, which makes it readily fit for implementation.  ...  The proposed protocol protects the patients' privacy throughout the prescription handling process, while complying with most aspects of the current Belgian healthcare practise.  ...  The second author was previously funded by the Universitary Mission of Tunisia in North America.  ... 
doi:10.1007/978-3-540-69485-4_9 fatcat:jmyv27ee7jczxdyskyyzhatfzy

Opaak

Gabriel Maganis, Elaine Shi, Hao Chen, Dawn Song
2012 Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12  
Opaak leverages the mobile phone as a scarce resource combined with anonymous credentials in order to provide these features.  ...  However, online services and users often have to make the trade off between trust and anonymity due to the lack of usable frameworks for achieving them both.  ...  When Alice wishes to login to an account she has created with the relying party (using the previous protocol), she proves possession of her anonymous credential and shows a valid rnym along with a ZKPK  ... 
doi:10.1145/2307636.2307664 dblp:conf/mobisys/MaganisSCS12 fatcat:h46euprf7nbedarjib245ncvma

Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials [chapter]

Scott Coull, Matthew Green, Susan Hohenberger
2009 Lecture Notes in Computer Science  
To do so, we show how to augment existing anonymous credential systems so that, in addition to certifying a user's attributes, they also store state about the user's database access history.  ...  As our primary application, we show how to construct privacy-preserving databases by combining oblivious transfer with an augmented anonymous credential system.  ...  The original version of this chapter was revised: The copyright line was incorrect. This has been corrected.  ... 
doi:10.1007/978-3-642-00468-1_28 fatcat:wbeduqf5t5havpoehbxtjgvaga

Masked Ballot Voting for Receipt-Free Online Elections [chapter]

Roland Wen, Richard Buckland
2009 Lecture Notes in Computer Science  
Masked Ballot performs only the voting part of an election and is designed to integrate with counting schemes that compute the final election result.  ...  During the election voters cast ballots over completely public channels without relying on untappable channels, anonymous channels or trusted devices.  ...  Acknowledgements We are grateful to Berry Schoenmakers and Tal Moran for very helpful discussions. We also thank the anonymous referees for many valuable comments.  ... 
doi:10.1007/978-3-642-04135-8_2 fatcat:nhk7su4rhfbcrp6g5vpb5pj72m
« Previous Showing results 1 — 15 out of 7,468 results