Abstract
In this chapter we motivate the need for anonymity at the communication layer and describe the potential risks of having traceable communications. We then introduce the legal requirements on data retention and motivate the need for revocability of anonymity upon the request of law enforcement.
We describe the main building blocks for anonymous communication and for anonymity revocation. We explain how these building blocks can be combined in order to build a revocable anonymous communication infrastructure that fulfills both privacy and law enforcement requirements.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This work was supported by the IWT SBO project on advanced applications for electronic identity cards in Flanders (ADAPID).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. Neumann, R. Rivest, J. Schiller, B. Schneier (1997) The Risks of Key Recovery, Key Escrow, and Trusted Third Party Encryption. World Wide Web Journal 2(3):241–257.
Anonymizer, http://www.anonymizer.com/
O. Berthold, H. Federrath, S. Kopsell (2000) Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath H (ed.) Designing Privacy Enhancing Technologies, LNCS 2009, pp. 115–129. Springer-Verlag.
O. Berthold, A. Pfitzmann, R. Standtke (2000) The disadvantages of free MIX routes and how to overcome them. In: Federrath H (ed.) Designing Privacy Enhancing Technologies, LNCS 2009, pp. 30–45. Springer-Verlag.
D. Boneh, M. Franklin (1999) An Efficient Public Key Traitor Tracing Scheme. In: Wiener M (ed.) Advances in Cryptology-CRYPTO’99, LNCS 1666, pp. 338–353. Springer-Verlag.
J. Camenisch, A. Lysyanskaya (2001) An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann B (ed.) Advances in Cryptology-EUROCRYPT’01, LNCS 2045, pp. 93–118. Springer-Verlag
J. Camenisch, E. van Herreweghen (2002) Design and Implementation of the idemix Anonymous Credential System. In: Atluri V (ed.) Proceedings of the 9th ACM conference on Computer and Communications Security, pp. 21–30. ACM Press.
D. Chaum (1985) Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28(10):1030–1044.
D. Chaum, J. Evertse (1987) A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations. In: Odlyzko A (ed.) Advances in Cryptology-CRYPTO’86, LNCS 263, pp. 118–167. Springer-Verlag.
J. Claessens, C. Diaz, C. Goemans, B. Preneel, J. Vandewalle, J. Dumortier (2003) Revocable anonymous access to the Internet. Journal of Internet Research 13(4):242–258.
J. Claessens, C. Diaz, B. Preneel, J. Vandewalle (2002) A Privacy-Preserving Web Banner System for Targeted Advertising. Technical Report 9 p. Katholieke Universiteit Leuven.
C. Diaz, S. Seys, J. Claessens, B. Preneel (2002) Towards Measuring Anonymity. In: Dingledine R, Syverson P (eds.) Designing Privacy Enhancing Technologies, LNCS 2482, pp. 54–68. Springer-Verlag.
C. Diaz, V. Naessens, S. Nikova, B. de Decker, B. Preneel (2004) Tools for Technologies and Applications of Controlled Anonymity. Technical Report, 211 p. Project IWT STWW Anonymity and Privacy in Electronic Services.
R. Dingledine, N. Mathewson, P. Syverson (2004) Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium, pp. 303–320. USENIX.
Directive 2006/24/EC of the European Parliament and of the Council (13.4.2006) Official Journal of the European Union.
D. Goldschlag, M. Reed, P. Syverson (1996) Hiding Routing Information. In: R. Anderson (ed.) Information Hiding, LNCS 1174, pp. 137–150. Springer-Verlag.
D. Goldschlag, M. Reed, P. Syverson (1999) Onion Routing. In: Communications of the ACM 42(2):39–41.
A. Hintz (2002) Fingerprinting Websites Using Traffic Analysis. In: R. Dingledine, P. Syverson (eds.) Designing Privacy Enhancing Technologies, LNCS 2482, pp. 171–178. Springer-Verlag.
JAP Anonymity & Privacy, http://anon.inf.tu-dresden.de/
A. Juels (2001) Targeted Advertising... and Privacy Too. In: D. Naccache (ed.) Topics in Cryptology-Proceedings of the Cryptographers’ Track at RSA’2001, LNCS 2020, pp. 408–424. Springer-Verlag.
S. Kopsell, R. Wendolsky, H. Federrath (2006) Revocable Anonymity. In: G. Muller (ed.): Emerging Trends in Information and Communication Security-ETRICS, LNCS 3995, pp. 206–220. Springer-Verlag.
A. Lysyanskaya, R. Rivest, A. Sahai, S. Wolf (1999) Pseudonym Systems. In: H. Heys, C. Adams (eds.) Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, LNCS 1758, pp. 184–199. Springer-Verlag.
A. Pfitzmann, M. Hansen (2000) Anonymity, Unobservability and Pseudonymity: A Proposal for Terminology. In: Federrath H (ed.) Designing Privacy Enhancing Technologies, LNCS 2009, pp. 1–9. Springer-Verlag.
A. Pfitzmann, B. Pfitzmann, M. Waidner (1991) ISDN-mixes: Untraceable communication with very small bandwidth overhead. In: W. Effelsberg, H. Meuer, G. Muller (eds.) GI/ITG Conference on Communication in Distributed Systems, Informatik-Fachberichte 267, pp. 451–463. Springer-Verlag.
M. Reed, P. Syverson, D. Goldschlag (1998) Anonymous Connections and Onion Routing. In: IEEE Journal on Selected Areas in Communications 16(4):482–494.
A. Serjantov, G. Danezis (2002) Towards an Information Theoretic Metric for Anonymity. In: Dingledine R, Syverson P (eds.) Designing Privacy Enhancing Technologies, LNCS 2482, pp. 41–53. Springer-Verlag.
P. Syverson, G. Tsudik, M. Reed, C. Landwehr (2000) Towards an Analysis of Onion Routing Security. In: Federrath H (ed.) Designing Privacy Enhancing Technologies, LNCS 2009, pp. 96–114. Springer-Verlag.
The Clipper Chip, http://www.epic.org/crypto/clipper/
L. von Ahn, A. Bortz, N. Hopper, K. O’Neill (2006) Selectively Traceable Anonymity. In: Danezis G, Golle P (eds.) Designing Privacy Enhancing Technologies, LNCS (pre-proceedings), pp. 199–213. Springer-Verlag.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Diaz, C., Preneel, B. (2007). Accountable Anonymous Communication. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-69861-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69860-9
Online ISBN: 978-3-540-69861-6
eBook Packages: Computer ScienceComputer Science (R0)