Skip to main content

Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6863))

Abstract

Regarding the increasing number of applications provided as external services, the importance of pseudonymous data as a means for privacy protection of user entities is growing. Along with it grows the relevance of secure and accurate generation, use and management of pseudonyms. In particular we consider the involvement of third parties in this process as potentially harmful, and therefore favor a decentralized pseudonym generation approach where the role of central components is reduced to a minimum. In this paper, we propose a pseudonym generation mechanism and focus on its implementation based on elliptic curve cryptography, in which every user entity can generate an arbitrary number of uncorrelatable pseudonyms with minimal effort, initially as well as at any later point in time. Because no sensitive information necessary for pseudonym generation is available on central components, our approach provides security as well as flexibility and usability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Manulis, M., Schwenk, J.: Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 107–124. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Schartner, P., Schaffer, M.: Unique User-Generated Digital Pseudonyms. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 194–205. Springer, Heidelberg (2005)

    Google Scholar 

  3. Mjølsnes, S.F.: Privacy, Cryptographic Pseudonyms, and The State of Health. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 493–494. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  4. Franz, E., Liesebach, K.: Supporting Local Aliases as Usable Presentation of Secure Pseudonyms. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2009. LNCS, vol. 5695, pp. 22–31. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H., Adams, C. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)

    Google Scholar 

  6. Pearson, S., Shen, Y., Mowbray, M.: A Privacy Manager for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Mowbray, M., Pearson, S.: A Client-Based Privacy Manager for Cloud Computing. In: COMSWARE 2009: Proceedings of the Fourth International ICST Conference on COMmunication System Software and Middleware. ACM, New York (2009)

    Google Scholar 

  8. Candebat, T., Dunne, C.R., Gray, D.T.: Pseudonym Management using Mediated Identity-Based Cryptography. In: DIM 2005: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 1–10. ACM, New York (2005)

    Chapter  Google Scholar 

  9. Waters, B.R., Felten, E.W., Sahai, A.: Receiver Anonymity via Incomparable Public Keys. In: CCS 2003: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 112–121. ACM, New York (2003)

    Google Scholar 

  10. Au, R., Vasanta, H., Kwang, K., Choo, R., Looi, M.: A User-Centric Anonymous Authorisation Framework in E-commerce Environment. In: Janssen, M., Sol, H.G., Wagenaar, R.W. (eds.) ICEC 2004: Proceedings of the 6th International Conference on Electronic Commerce, pp. 138–147. ACM, New York (2004)

    Google Scholar 

  11. Schmoll, C., Chatzis, N., Henke, C.: Protecting User Privacy with Multi-Field Anonymisation of IP Addresses. In: SIN 2010: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 38–45. ACM, New York (2010)

    Google Scholar 

  12. Jaiswal, S., Nandi, A.: Trust No One: A Decentralized Matching Service for Privacy in Location Based Services. In: MobiHeld 2010: Proceedings of the second ACM SIGCOMM workshop on Networking, Systems, and Applications on Mobile Handhelds, pp. 51–56. ACM, New York (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lehnhardt, J., Spalka, A. (2011). Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2011. Lecture Notes in Computer Science, vol 6863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22890-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22890-2_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22889-6

  • Online ISBN: 978-3-642-22890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics