Abstract
In this paper, we discuss a protocol allowing the remote user of a system providing revocable anonymity to be assured of whether or not her anonymity is revoked. We achieve this via a novel use of Trusted Computing and Virtual Monotonic Counters. The protocol has wide-ranging scope in a variety of computer security fields, such as electronic cash, fair exchange and electronic voting.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ables, K., Ryan, M.D.: Escrowed Data and the Digital Envelope. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 246–256. Springer, Heidelberg (2010)
Blackburn, R.: The Electoral System in Britain. Macmillan, London (1995)
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM (2004)
Camenisch, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1), 69–89 (1997)
Challener, D., Yoder, K., Catherman, R., Safford, D., Doorn, L.V.: A Practical Guide to Trusted Computing. IBM Press, Boston (2008)
Chen, Y., Chou, J.S., Sun, H.M., Cho, M.H.: A Novel Electronic Cash System with Trustee-Based Anonymity Revocation From Pairing. Electronic Commerce Research and Applications (2011), doi:10.1016/j.elerap.2011.06.002
Fan, C.I., Liang, Y.K.: Anonymous Fair Transaction Protocols Based on Electronic Cash. International Journal of Electronic Commerce 13(1), 131–151 (2008)
Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable Constant-Size Fair E-Cash. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226–247. Springer, Heidelberg (2009)
Hou, X., Tan, C.H.: On Fair Traceable Electronic Cash. In: Proceedings, 3rd Annual Communication Networks and Services Research Conference, pp. 39–44. IEEE (2005)
Jakobsson, M., Yung, M.: Revokable and Versatile Electronic Money (Extended Abstract). In: CCS 1996: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 76–87. ACM Press, New York (1996)
Kügler, D., Vogt, H.: Off-line Payments with Auditable Tracing. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 269–281. Springer, Heidelberg (2003)
Moran, T., Naor, M.: Basing Cryptographic Protocols on Tamper-Evident Seals. Theoretical Computer Science 411(10) (2010)
Pointcheval, D.: Self-Scrambling Anonymizers. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 259–275. Springer, Heidelberg (2001)
Sarmenta, L.F., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual Monotonic Counters and Count-Limited Objects using a TPM without a trusted OS. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006, pp. 27–42. ACM, New York (2006)
Smart, M., Ritter, E.: Remote Electronic Voting with Revocable Anonymity. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 39–54. Springer, Heidelberg (2009)
Smart, M., Ritter, E.: True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., GarcÃa Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 187–202. Springer, Heidelberg (2011)
Tan, Z.: An Off-line Electronic Cash Scheme Based on Proxy Blind Signature. The Computer Journal 54(4), 505–512 (2011)
TCG: Trusted Computing Group: TPM Main: Part 2: Structures of the TPM, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE
TCG: Trusted Computing Group: TPM Main: Part 3: Commands, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE
The Electoral Commission: Factsheet: Ballot Secrecy (December 2006), http://www.electoralcommission.org.uk/__data/assets/electoral_commission_pdf_file/0020/13259/Ballot-Secrecy-2006-12_23827-6127__E__N__S__W__.pdf
Wang, C., Lu, R.: An ID-based Transferable Off-Line e-Cash System with Revokable Anonymity. In: Proceedings, International Symposium on Electronic Commerce and Security, ISECS 2008, pp. 758–762. IEEE (2008)
Weber, S.G., Mühlhäuser, M.: Multilaterally Secure Ubiquitous Auditing. In: Caballé, S., Xhafa, F., Abraham, A. (eds.) Intelligent Networking, Collaborative Systems and Applications. SCI, vol. 329, pp. 207–233. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Smart, M., Ritter, E. (2012). Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds) Trust and Trustworthy Computing. Trust 2012. Lecture Notes in Computer Science, vol 7344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30921-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-30921-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30920-5
Online ISBN: 978-3-642-30921-2
eBook Packages: Computer ScienceComputer Science (R0)