Proceedings of the 4th ACM conference on Computer and communications security
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
Universal custodian-hiding verifiable encryption for discrete logarithms
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Modeling and Verification of Privacy Enhancing Protocols
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Hi-index | 0.00 |
This paper presents and evaluates an improved anonymity revocation protocol. This protocol can be used to strengthen anonymity revocation capability in a privacy-enhancing identity management system. This protocol is user-centric, abuse-resistant, and it provides enforceable conditions fulfillment. We assume the existence of 1 honest referee out of tdesignated referees (t 1) chosen by users, and no collusion between users and referees. The security and performance of this protocol are evaluated.