Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing

  • Matt Smart
  • Eike Ritter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7344)

Abstract

In this paper, we discuss a protocol allowing the remote user of a system providing revocable anonymity to be assured of whether or not her anonymity is revoked. We achieve this via a novel use of Trusted Computing and Virtual Monotonic Counters. The protocol has wide-ranging scope in a variety of computer security fields, such as electronic cash, fair exchange and electronic voting.

Keywords

Trusted Platform Module Trust Computing Fair Exchange Electronic Vote Identity Provider 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ables, K., Ryan, M.D.: Escrowed Data and the Digital Envelope. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 246–256. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  2. 2.
    Blackburn, R.: The Electoral System in Britain. Macmillan, London (1995)Google Scholar
  3. 3.
    Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM (2004)Google Scholar
  4. 4.
    Camenisch, J., Maurer, U., Stadler, M.: Digital Payment Systems with Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1), 69–89 (1997)Google Scholar
  5. 5.
    Challener, D., Yoder, K., Catherman, R., Safford, D., Doorn, L.V.: A Practical Guide to Trusted Computing. IBM Press, Boston (2008)Google Scholar
  6. 6.
    Chen, Y., Chou, J.S., Sun, H.M., Cho, M.H.: A Novel Electronic Cash System with Trustee-Based Anonymity Revocation From Pairing. Electronic Commerce Research and Applications (2011), doi:10.1016/j.elerap.2011.06.002Google Scholar
  7. 7.
    Fan, C.I., Liang, Y.K.: Anonymous Fair Transaction Protocols Based on Electronic Cash. International Journal of Electronic Commerce 13(1), 131–151 (2008)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Transferable Constant-Size Fair E-Cash. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 226–247. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  9. 9.
    Hou, X., Tan, C.H.: On Fair Traceable Electronic Cash. In: Proceedings, 3rd Annual Communication Networks and Services Research Conference, pp. 39–44. IEEE (2005)Google Scholar
  10. 10.
    Jakobsson, M., Yung, M.: Revokable and Versatile Electronic Money (Extended Abstract). In: CCS 1996: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 76–87. ACM Press, New York (1996)CrossRefGoogle Scholar
  11. 11.
    Kügler, D., Vogt, H.: Off-line Payments with Auditable Tracing. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 269–281. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Moran, T., Naor, M.: Basing Cryptographic Protocols on Tamper-Evident Seals. Theoretical Computer Science 411(10) (2010)Google Scholar
  13. 13.
    Pointcheval, D.: Self-Scrambling Anonymizers. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 259–275. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Sarmenta, L.F., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual Monotonic Counters and Count-Limited Objects using a TPM without a trusted OS. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC 2006, pp. 27–42. ACM, New York (2006)CrossRefGoogle Scholar
  15. 15.
    Smart, M., Ritter, E.: Remote Electronic Voting with Revocable Anonymity. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 39–54. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  16. 16.
    Smart, M., Ritter, E.: True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 187–202. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  17. 17.
    Tan, Z.: An Off-line Electronic Cash Scheme Based on Proxy Blind Signature. The Computer Journal 54(4), 505–512 (2011)CrossRefGoogle Scholar
  18. 18.
    TCG: Trusted Computing Group: TPM Main: Part 2: Structures of the TPM, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE
  19. 19.
    TCG: Trusted Computing Group: TPM Main: Part 3: Commands, Version 1.2, Revision 103 (October 2006), http://bit.ly/camUwE
  20. 20.
  21. 21.
    Wang, C., Lu, R.: An ID-based Transferable Off-Line e-Cash System with Revokable Anonymity. In: Proceedings, International Symposium on Electronic Commerce and Security, ISECS 2008, pp. 758–762. IEEE (2008)Google Scholar
  22. 22.
    Weber, S.G., Mühlhäuser, M.: Multilaterally Secure Ubiquitous Auditing. In: Caballé, S., Xhafa, F., Abraham, A. (eds.) Intelligent Networking, Collaborative Systems and Applications. SCI, vol. 329, pp. 207–233. Springer, Heidelberg (2010)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Matt Smart
    • 1
  • Eike Ritter
    • 1
  1. 1.School of Computer ScienceUniversity of BirminghamUK

Personalised recommendations