Private information escrow bound to multiple conditions

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Private information escrow bound to multiple conditions.


We propose two variants of a protocol that provides users' private information escrow capability bound to multiple set of conditions in a federated single sign-on environment using trusted platform module (TPM) and secure processor technologies. The first variant assumes the existence of a trusted anonymity revo- cation manager, while the second variant does not. Cryptographic techniques, such as identity-based re- encryption and custodian-hiding encryption, are ap- plied in our protocol. A performance analysis of our protocol is provided to show that our protocol achieves a better performance in comparison to the existing anonymous credential approach. This is es- pecially true when a user interacts with many service providers in a session. The security properties pro- vided by both variants of our protocol are discussed.

Impact and interest:

Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

147 since deposited on 15 Feb 2009
2 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 17763
Item Type: Report
Refereed: No
Keywords: privacy, conditional anonymity, anonymous credential, federated single sign-on, identity-based re-encryption
Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Information Security Institute
Copyright Owner: Copyright 2008 [please consult the authors]
Deposited On: 15 Feb 2009 22:15
Last Modified: 09 Jun 2010 13:21

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page