A User-Centric Protocol for Conditional Anonymity Revocation
Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-Centric Protocol for Conditional Anonymity Revocation. In Furnell, Steven M., Katsikas, Sokratis K., & Lioy, Antonio (Eds.) Trust Privacy and Security in Digital Business, Springer, Turin, Italy, pp. 185-194.
This paper presents and evaluates an improved anonymity revocation protocol. This protocol can be used to strengthen anonymity revocation capability in a privacy-enhancing identity management system. This protocol is user-centric, abuse-resistant, and it provides enforceable conditions fulfillment. We assume the existence of 1 honest referee out of t designated referees (t > 1) chosen by users, and no collusion between users and referees. The security and performance of this protocol are evaluated.
Impact and interest:
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Conference Paper|
|Additional Information:||For more information, please refer to the publisher website (see hypertext link) or contact the author.|
|Keywords:||privacy, anonymity revocation, user centric, group encryption, anonymous credential|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
Past > Institutes > Information Security Institute
|Copyright Owner:||Copyright 2008 Springer|
|Deposited On:||03 Feb 2009 14:48|
|Last Modified:||17 Jul 2014 16:14|
Repository Staff Only: item control page