Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing
- Cite this paper as:
- Smart M., Ritter E. (2012) Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing. In: Katzenbeisser S., Weippl E., Camp L.J., Volkamer M., Reiter M., Zhang X. (eds) Trust and Trustworthy Computing. Trust 2012. Lecture Notes in Computer Science, vol 7344. Springer, Berlin, Heidelberg
In this paper, we discuss a protocol allowing the remote user of a system providing revocable anonymity to be assured of whether or not her anonymity is revoked. We achieve this via a novel use of Trusted Computing and Virtual Monotonic Counters. The protocol has wide-ranging scope in a variety of computer security fields, such as electronic cash, fair exchange and electronic voting.
Unable to display preview. Download preview PDF.