Anonymity protocol with identity escrow and analysis in the applied π-calculus

  • Authors:
  • Aybek Mukhamedov;Mark D. Ryan

  • Affiliations:
  • School of Computer Science, University of Birmingham;School of Computer Science, University of Birmingham

  • Venue:
  • TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.01

Visualization

Abstract

Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity if the service is misused. We introduce a new protocol in which the user's identity is distributed among several token providers. Anonymity is assured provided at least one of the token providers is honest (and the misuse has not occurred). We analyse the protocol in the applied π-calculus.