Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.5.113

Private Pseudonym Retrieval with Controlled Traceability  

Nyang, Dae-Hun (The Graduate School of Information Tech & Telecomm, InHa University)
Lee, Kyung-Hee (Department of Electrical Engineering, The University of Suwon)
Abstract
Pseudonyms must be maintained anonymously even to the organization that issues the pseudonyms, but when some event occurs that policy defines the real identity for the pseudonym must be able to be traced. We propose a private pseudonym retrieval protocol with controlled traceability using m-out-of-n oblivious transfer and cut-and-choose technique.
Keywords
Anonymity; Pseudonym; Oblivious Transfer; Credential; Cut and Choose;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D. Chaum, 'Untraceable electronic mail, return addresses, and digital pseudonyms,' Communications of the ACM, vol. 4, no. 2, February 1981
2 A. Lysyanskaya, R. Rivest, A. Sahai and S. Wolf, 'Pseudonym systems,' Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 1758, Springer-Verlag, 1999
3 T. Kwon, J. Cheon, Y. Kim and J. Lee, 'Privacy Protection in PKIs: A Separation-of-Authority Approach,' Workshop on Information Security Applications 2006, to appear
4 Y. Mu, J. Zhang and V. Varadharajan, 'm out of n oblivious transfer,' In Proceedings of the 7th Australasian Conference on Information Security and Privacy (ACISP '02), volume 2384 of LNCS, pp. 395-405. Springer- Verlag, 2002
5 L. Chen, 'Access with pseudonyms,' Cryptography: Policy and Algorithms, Lecture Notes in Computer Science, vol. 1029, Springer-Verlag, pp.232-243, 1995
6 D. Chaum and J. Evertse, 'A secure and privacy-protecting protocol for transmitting personal information between organizations,' CRYPTO '86, Lecture Notes in Computer Science, vol. 263, Springer-Verlag, pp.118-167, 1987
7 박해룡, 김지현, 천동형, 전길수, 이재일, '프라이버시 보호를 위한 익명성 및 익명성 제어 모델분석,' 정보보호학회지 14권 6호, pp.14-27, December, 2004
8 J. Camenisch and E. Herreweghen, 'Design and implementation of the Idemix anonymous credential system,' ACM Conference on Computer and Communications Security, pp.21-30, 2002
9 V. Benjumea, J. Lopez, J. Montegegro, and J. Troya, 'A first approach to provide anonymity in attribute certicates,' PKC 2004, Lecture Notes in ComputerScience, vol. 2947, Springer-Verlag, pp.402-415, 2004
10 J. Camenisch and A. Lysyanskaya, 'Efficient non-transferable anonymous multishow credential system with optional anonymity revocation,' Eurocrypt '01, Lecture Notes in Computer Science, vol. 2045, Springer-Verlag, pp.93-118, 2001