Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.1.33

Conditionally Traceable Pseudonym Protocol based on Oblivious Transfer  

Kang, Jeon-Il (INHA University)
Nyang, Dae-Hun (INHA University)
Lee, Kyung-Hee (University of Suwon)
Abstract
Recently, there have been many researches about anonymous credential systems for supporting the user anonymity. However, these systems only hold a high security level, even though they must be able to be applied to various application that might require access control, conditional traceability, etc. As new challenges to these systems, some researches that several entities store the link information that associates identities and pseudonyms each other have been performed. In this paper, based on the oblivious transfer, we suggest a new pseudonym protocol that solves the pseudonym exhaustion problem which the original pseudonym retrieval protocol suffers from. By using the universal re-encryption and one-way function, we can also archive other requirements like the pseudonym unlinkability from the outside.
Keywords
Anonymous Credential; Pseudonym; Oblivious Transfer;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D. Chaum and J.H. Evertse, "A secure and privacy protecting protocol for transmitting personal information between organizations," CRYPTO'86, LNCS 263, pp. 118-167, 1986
2 I.B. Damgard, "Payment systems and credential mechanisms with provable security against abuse by individuals," CRYPTO'88, LNCS 403, pp. 328-335, 1988
3 L. Chen, "Access with pseudonyms," Cryptography: Policy and Algorithms, LNCS 1029, pp. 232-243, 1995
4 J. Camenisch and A. Lysyanskaya, "An efficient system for non-transferable anonymous credentials with optional anonymity revocation," EUROCRYPT'01, LNCS 2045, pp. 93-118, 2001
5 G. Brassard, C. Cr$\acute{e}$peau, and J.M. Robert, "All-or-nothing disclosure of secrets," CRYPTO'86, LNCS 263, pp. 234–238, 1986
6 Y. Mu, J. Zhang, and V. Varadharajan, "m out of n oblivious transfer," Australasian Conference on Information Security and Privacy, LNCS 2384, pp. 395-405, 2002
7 A. Lysyanskaya, R.L. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," Workshop on Selected Areas in Cryptography 1999, LNCS 1758, pp. 184-199, 1999
8 권태경, 박해룡, 이철수, "공개키 기반 구조에 기반한 익명게시판 기술 현황," 정보보호학회지, 14(6), pp. 1-13, 2004년 12월
9 D. Chaum, "Security without identification transaction systems to make Big Brother obsolete," Communications of the ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985   DOI   ScienceOn
10 V. Benjumea, J. Lopez, J.A. Montenegro, and J.M. Troya, "A First Approach to Provide Anonymity in Attribute Certificates," PKC 2004, LNCS 2947, pp. 402-415, 2004
11 P.P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, "Blacklistable anonymous credentials: blocking misbehaving users without TTP," ACM Conference on Computer and Communications Security 2007, pp. 72-81, Oct. 2007   DOI
12 양대헌, 이경희, "추적 가능한 가명 은밀 획득 프로토콜," 정보보호학회논문지, 16(5), pp. 113-118, 2006년 10월
13 M. Jakobsson, A. Juels, and P. Syverson, "Universal re-encryption for mixnets," RSA Conference 2004, Cryptographer's track, LNCS 2964, pp. 163-178, 2004
14 M. Layouni and H. Vangheluwe, "Anonymousk-show credentials," EuroPKI'07, LNCS 4582, pp. 181–192, 2007
15 T. Kwon, J.H. Cheon, Y. Kim, and J. Lee, "Privacy Protection in PKIs: A Separation-of-Authority Approach," International Workshop on Information Security Applications, LNCS 4298, pp. 297-311, 2007