Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Anonymity and accountability in self-organizing electronic communities
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
On the Security of RSA Padding
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Accountable Anonymous Access to Services in Mobile Communication Systems
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Anonymous access scheme for electronic-services
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 11th ACM conference on Computer and communications security
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
A user-centric anonymous authorisation framework in e-commerce environment
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Divisible E-Cash Systems Can Be Truly Anonymous
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
SP'04 Proceedings of the 12th international conference on Security Protocols
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Randomization enhanced Chaum's blind signature scheme
Computer Communications
Hi-index | 0.00 |
Online reservation systems have grown over the last recent years to facilitate the purchase of goods and services. Generally, reservation systems require that customers provide some personal data to make a reservation effective. With this data, service providers can check the consumer history and decide if the user is trustable enough to get the reserve. Although the reputation of a user is a good metric to implement the access control of the system, providing personal and sensitive data to the system presents high privacy risks, since the interests of a user are totally known and tracked by an external entity. In this paper we design an anonymous reservation protocol that uses reputations to profile the users and control their access to the offered services, but at the same time it preserves their privacy not only from the seller but the service provider.