Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing

  • Matt Smart
  • Eike Ritter
Conference paper

DOI: 10.1007/978-3-642-30921-2_2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7344)
Cite this paper as:
Smart M., Ritter E. (2012) Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing. In: Katzenbeisser S., Weippl E., Camp L.J., Volkamer M., Reiter M., Zhang X. (eds) Trust and Trustworthy Computing. Trust 2012. Lecture Notes in Computer Science, vol 7344. Springer, Berlin, Heidelberg

Abstract

In this paper, we discuss a protocol allowing the remote user of a system providing revocable anonymity to be assured of whether or not her anonymity is revoked. We achieve this via a novel use of Trusted Computing and Virtual Monotonic Counters. The protocol has wide-ranging scope in a variety of computer security fields, such as electronic cash, fair exchange and electronic voting.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Matt Smart
    • 1
  • Eike Ritter
    • 1
  1. 1.School of Computer ScienceUniversity of BirminghamUK

Personalised recommendations