Anonymous transactions in computer networks (Extended Abstract)

Shlomi Dolev, Marina Kopeetsky

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft. In both schemes the authority provides each user with a unique random string. A player U may produce unique user name and password for each other player S using a one way function over the random string and the IP address of S. The player does not have to maintain any information in order to reproduce the user name and password used for accessing a player S. Moreover, the player U may execute transactions with a group of players S U in two phases; in the first phase the player interacts with each server without revealing information concerning its identity and without possibly identifying linkability among the servers in S U . In the second phase the player allows linkability and therefore transaction commitment with all servers in S U , while preserving anonymity (for future transactions).

Original languageEnglish
Title of host publicationStabilization, Safety, and Security of Distributed Systems - 11th International Symposium, SSS 2009, Proceedings
Pages297-310
Number of pages14
DOIs
StatePublished - 1 Dec 2009
Event11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009 - Lyon, France
Duration: 3 Nov 20096 Nov 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5873 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009
Country/TerritoryFrance
CityLyon
Period3/11/096/11/09

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Anonymous transactions in computer networks (Extended Abstract)'. Together they form a unique fingerprint.

Cite this