Skip to main content

Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing

  • Conference paper
Trust and Trustworthy Computing (Trust 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7344))

Included in the following conference series:

  • 2112 Accesses

Abstract

In this paper, we discuss a protocol allowing the remote user of a system providing revocable anonymity to be assured of whether or not her anonymity is revoked. We achieve this via a novel use of Trusted Computing and Virtual Monotonic Counters. The protocol has wide-ranging scope in a variety of computer security fields, such as electronic cash, fair exchange and electronic voting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ables, K., Ryan, M.D.: Escrowed Data and the Digital Envelope. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 246–256. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Blackburn, R.: The Electoral System in Britain. Macmillan, London (1995)

    Google Scholar 

  3. Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM (2004)

    Google Scholar 

  4. Camenisch, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1), 69–89 (1997)

    Google Scholar 

  5. Challener, D., Yoder, K., Catherman, R., Safford, D., Doorn, L.V.: A Practical Guide to Trusted Computing. IBM Press, Boston (2008)

    Google Scholar 

  6. Chen, Y., Chou, J.S., Sun, H.M., Cho, M.H.: A Novel Electronic Cash System with Trustee-Based Anonymity Revocation From Pairing. Electronic Commerce Research and Applications (2011), doi:10.1016/j.elerap.2011.06.002

    Google Scholar 

  7. Fan, C.I., Liang, Y.K.: Anonymous Fair Transaction Protocols Based on Electronic Cash. International Journal of Electronic Commerce 13(1), 131–151 (2008)

    Article  MathSciNet  Google Scholar 

  8. Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable Constant-Size Fair E-Cash. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226–247. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Hou, X., Tan, C.H.: On Fair Traceable Electronic Cash. In: Proceedings, 3rd Annual Communication Networks and Services Research Conference, pp. 39–44. IEEE (2005)

    Google Scholar 

  10. Jakobsson, M., Yung, M.: Revokable and Versatile Electronic Money (Extended Abstract). In: CCS 1996: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 76–87. ACM Press, New York (1996)

    Chapter  Google Scholar 

  11. Kügler, D., Vogt, H.: Off-line Payments with Auditable Tracing. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 269–281. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Moran, T., Naor, M.: Basing Cryptographic Protocols on Tamper-Evident Seals. Theoretical Computer Science 411(10) (2010)

    Google Scholar 

  13. Pointcheval, D.: Self-Scrambling Anonymizers. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 259–275. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Sarmenta, L.F., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual Monotonic Counters and Count-Limited Objects using a TPM without a trusted OS. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006, pp. 27–42. ACM, New York (2006)

    Chapter  Google Scholar 

  15. Smart, M., Ritter, E.: Remote Electronic Voting with Revocable Anonymity. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 39–54. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  16. Smart, M., Ritter, E.: True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 187–202. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  17. Tan, Z.: An Off-line Electronic Cash Scheme Based on Proxy Blind Signature. The Computer Journal 54(4), 505–512 (2011)

    Article  Google Scholar 

  18. TCG: Trusted Computing Group: TPM Main: Part 2: Structures of the TPM, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE

  19. TCG: Trusted Computing Group: TPM Main: Part 3: Commands, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE

  20. The Electoral Commission: Factsheet: Ballot Secrecy (December 2006), http://www.electoralcommission.org.uk/__data/assets/electoral_commission_pdf_file/0020/13259/Ballot-Secrecy-2006-12_23827-6127__E__N__S__W__.pdf

  21. Wang, C., Lu, R.: An ID-based Transferable Off-Line e-Cash System with Revokable Anonymity. In: Proceedings, International Symposium on Electronic Commerce and Security, ISECS 2008, pp. 758–762. IEEE (2008)

    Google Scholar 

  22. Weber, S.G., Mühlhäuser, M.: Multilaterally Secure Ubiquitous Auditing. In: Caballé, S., Xhafa, F., Abraham, A. (eds.) Intelligent Networking, Collaborative Systems and Applications. SCI, vol. 329, pp. 207–233. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Smart, M., Ritter, E. (2012). Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds) Trust and Trustworthy Computing. Trust 2012. Lecture Notes in Computer Science, vol 7344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30921-2_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30920-5

  • Online ISBN: 978-3-642-30921-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics