Abstract
As the first application of secure anonymous systems, after reviewing conventional schemes, this chapter develops anonymous token, ITL, and ID list based anonymous authentication systems that enable authorities to determine whether entities are eligible or not without knowing their identities. Anonymous token and ITL based systems have advantages in protecting systems from ineligible entities, i.e. different from password based systems in which eligible entities can tell their passwords to others, entities in these systems cannot give their secret to others without losing their eligibilities (in ITL based systems, entity cannot steal secrets of others). On the other hand, ID list based systems have advantages in handling entities those forget their secrets or those are expelled from systems. In the last section of this chapter, an anonymous credential system is also developed based on anonymous tags.
Reference11 articles.
1. Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., & Shacham, H. (2009). Randomizable proofs and delegatable anonymous credentials. Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology, 16-20 August 2009, Santa Barbara, CA, (pp. 108-125).
2. Camenisch, J., & Lysyanskaya, A. (2001). An efficient system for non-transferable anonymous credential with optimal anonymity revocation. Proceedings of EUROCRYPT’01, the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptography, (pp. 93-118). London, UK: Springer-Verlag
3. Blind signatures system.;D.Chaum;Advances in Cryptology, CRYPTO,1983
4. Shahandashti, S. F., & Safavi-Naini, R. (2009). Threshold attribute-based signatures and their application to anonymous credential systems. Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology. Berlin, Germany: Springer-Verlag.