Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
Several credential systems have been proposed in which users can
authenticate to services anonymously. Since anonymity can give users
the license to misbehave, some variants allow the selective
deanonymization (or linking) of misbehaving users upon a complaint
to a trusted third party (TTP). The ability of the TTP to revoke a
user's privacy at any time, however, is too strong a punishment for
misbehavior. To limit the scope of deanonymization, systems such as
``e-cash'' have been proposed in which users are deanonymized under
only certain types of well-defined misbehavior such as ``double
spending.'' While useful in some applications, it is not possible
to generalize such techniques to more subjective definitions of
We present the first anonymous credential system in which services can ``blacklist'' misbehaving users without contacting a TTP. Since blacklisted users remain anonymous, misbehaviors can be judged subjectively without users fearing arbitrary deanonymization by a TTP.
This technical report is the extended version of the paper to appear in CCS '07 under the same title.
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version)." Dartmouth Computer Science Technical Report TR2007-601, September 2007.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.