Linking Anonymous Transactions: The Consistent View Attack

  • Andreas Pashalidis
  • Bernd Meyer
Conference paper

DOI: 10.1007/11957454_22

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4258)
Cite this paper as:
Pashalidis A., Meyer B. (2006) Linking Anonymous Transactions: The Consistent View Attack. In: Danezis G., Golle P. (eds) Privacy Enhancing Technologies. PET 2006. Lecture Notes in Computer Science, vol 4258. Springer, Berlin, Heidelberg

Abstract

In this paper we study a particular attack that may be launched by cooperating organisations in order to link the transactions and the pseudonyms of the users of an anonymous credential system. The results of our analysis are both positive and negative. The good (resp. bad) news, from a privacy protection (resp. evidence gathering) viewpoint, is that the attack may be computationally intensive. In particular, it requires solving a problem that is polynomial time equivalent to ALLSAT . The bad (resp. good) news is that a typical instance of this problem may be efficiently solvable.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Andreas Pashalidis
    • 1
  • Bernd Meyer
    • 1
  1. 1.Siemens AG, Corporate TechnologyMunichGermany

Personalised recommendations