SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Privacy, Cryptographic Pseudonyms, and The State of Health
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Receiver anonymity via incomparable public keys
Proceedings of the 10th ACM conference on Computer and communications security
A user-centric anonymous authorisation framework in e-commerce environment
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
A client-based privacy manager for cloud computing
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
Protecting user privacy with multi-field anonymisation of ip addresses
Proceedings of the 3rd international conference on Security of information and networks
Unique user-generated digital pseudonyms
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Pseudonym generation scheme for ad-hoc group communication based on IDH
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Hi-index | 0.00 |
Regarding the increasing number of applications provided as external services, the importance of pseudonymous data as a means for privacy protection of user entities is growing. Along with it grows the relevance of secure and accurate generation, use and management of pseudonyms. In particular we consider the involvement of third parties in this process as potentially harmful, and therefore favor a decentralized pseudonym generation approach where the role of central components is reduced to a minimum. In this paper, we propose a pseudonym generation mechanism and focus on its implementation based on elliptic curve cryptography, in which every user entity can generate an arbitrary number of uncorrelatable pseudonyms with minimal effort, initially as well as at any later point in time. Because no sensitive information necessary for pseudonym generation is available on central components, our approach provides security as well as flexibility and usability.