Publication | Closed Access
Blacklistable anonymous credentials
144
Citations
9
References
2007
Year
Unknown Venue
EngineeringInformation SecurityLawSeveral Credential SystemsCommunicationPseudonymizationBlacklistable Anonymous CredentialsDouble SpendingPrivacy-preserving CommunicationPrivacy Enhancing TechnologyIdentity-based SecurityData PrivacyTrustSelective DeanonymizationComputer SciencePrivacy AnonymityPrivacyData SecurityCryptographyArtsAuthentication Access Control
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow the selective deanonymization (or linking) of misbehaving users upon a complaint to a trusted third party (TTP). The ability of the TTP to revoke a user's privacy at any time, however, is too strong a punishment for misbehavior. To limit the scope of deanonymization, systems such as "e-cash" have been proposed in which users are deanonymized under only certain types of well-defined misbehavior such as "double spending." While useful in some applications, it is not possible to generalize such techniques to more subjective definitions of misbehavior.
| Year | Citations | |
|---|---|---|
Page 1
Page 1