Trust 2012: Trust and Trustworthy Computing pp 19-33 | Cite as
Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing
Conference paper
Abstract
In this paper, we discuss a protocol allowing the remote user of a system providing revocable anonymity to be assured of whether or not her anonymity is revoked. We achieve this via a novel use of Trusted Computing and Virtual Monotonic Counters. The protocol has wide-ranging scope in a variety of computer security fields, such as electronic cash, fair exchange and electronic voting.
Keywords
Trusted Platform Module Trust Computing Fair Exchange Electronic Vote Identity Provider
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Ables, K., Ryan, M.D.: Escrowed Data and the Digital Envelope. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 246–256. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 2.Blackburn, R.: The Electoral System in Britain. Macmillan, London (1995)Google Scholar
- 3.Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM (2004)Google Scholar
- 4.Camenisch, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1), 69–89 (1997)Google Scholar
- 5.Challener, D., Yoder, K., Catherman, R., Safford, D., Doorn, L.V.: A Practical Guide to Trusted Computing. IBM Press, Boston (2008)Google Scholar
- 6.Chen, Y., Chou, J.S., Sun, H.M., Cho, M.H.: A Novel Electronic Cash System with Trustee-Based Anonymity Revocation From Pairing. Electronic Commerce Research and Applications (2011), doi:10.1016/j.elerap.2011.06.002Google Scholar
- 7.Fan, C.I., Liang, Y.K.: Anonymous Fair Transaction Protocols Based on Electronic Cash. International Journal of Electronic Commerce 13(1), 131–151 (2008)MathSciNetCrossRefGoogle Scholar
- 8.Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable Constant-Size Fair E-Cash. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226–247. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 9.Hou, X., Tan, C.H.: On Fair Traceable Electronic Cash. In: Proceedings, 3rd Annual Communication Networks and Services Research Conference, pp. 39–44. IEEE (2005)Google Scholar
- 10.Jakobsson, M., Yung, M.: Revokable and Versatile Electronic Money (Extended Abstract). In: CCS 1996: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 76–87. ACM Press, New York (1996)CrossRefGoogle Scholar
- 11.Kügler, D., Vogt, H.: Off-line Payments with Auditable Tracing. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 269–281. Springer, Heidelberg (2003)CrossRefGoogle Scholar
- 12.Moran, T., Naor, M.: Basing Cryptographic Protocols on Tamper-Evident Seals. Theoretical Computer Science 411(10) (2010)Google Scholar
- 13.Pointcheval, D.: Self-Scrambling Anonymizers. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 259–275. Springer, Heidelberg (2001)CrossRefGoogle Scholar
- 14.Sarmenta, L.F., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual Monotonic Counters and Count-Limited Objects using a TPM without a trusted OS. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006, pp. 27–42. ACM, New York (2006)CrossRefGoogle Scholar
- 15.Smart, M., Ritter, E.: Remote Electronic Voting with Revocable Anonymity. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 39–54. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 16.Smart, M., Ritter, E.: True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 187–202. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 17.Tan, Z.: An Off-line Electronic Cash Scheme Based on Proxy Blind Signature. The Computer Journal 54(4), 505–512 (2011)CrossRefGoogle Scholar
- 18.TCG: Trusted Computing Group: TPM Main: Part 2: Structures of the TPM, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE
- 19.TCG: Trusted Computing Group: TPM Main: Part 3: Commands, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE
- 20.The Electoral Commission: Factsheet: Ballot Secrecy (December 2006), http://www.electoralcommission.org.uk/__data/assets/electoral_commission_pdf_file/0020/13259/Ballot-Secrecy-2006-12_23827-6127__E__N__S__W__.pdf
- 21.Wang, C., Lu, R.: An ID-based Transferable Off-Line e-Cash System with Revokable Anonymity. In: Proceedings, International Symposium on Electronic Commerce and Security, ISECS 2008, pp. 758–762. IEEE (2008)Google Scholar
- 22.Weber, S.G., Mühlhäuser, M.: Multilaterally Secure Ubiquitous Auditing. In: Caballé, S., Xhafa, F., Abraham, A. (eds.) Intelligent Networking, Collaborative Systems and Applications. SCI, vol. 329, pp. 207–233. Springer, Heidelberg (2010)CrossRefGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2012