2010
DOI: 10.1145/1880022.1880035
|View full text |Cite
|
Sign up to set email alerts
|

Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus

Abstract: Anonymity with identity escrow attempts to allow users of an on-line service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exceptional circumstances, such as to assist in a criminal investigation. In the paper, we propose an identity escrow protocol that distributes user identity among several escrow agents. The main feature of our scheme is it is based on standard encryption algorithms and it provides user anonymity even if all but one escrow holders ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…See e.g. the CCS approach [18,11,5], as well as the Applied pi-calculus approach for security [1], anonymity [19] and privacy [6]. In this paper, we consider a probabilistic extension of CCS, which we call CCS p .…”
Section: Introductionmentioning
confidence: 99%
“…See e.g. the CCS approach [18,11,5], as well as the Applied pi-calculus approach for security [1], anonymity [19] and privacy [6]. In this paper, we consider a probabilistic extension of CCS, which we call CCS p .…”
Section: Introductionmentioning
confidence: 99%