skip to main content
research-article

Anonymous transactions in computer networks

Published:30 July 2012Publication History
Skip Abstract Section

Abstract

We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user's anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Both schemes assume that all the players interact over anonymous secure channels. Given authority that generates for each player hard to produce evidence EVID (e.g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of aforementioned evidence. We use zero-knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

In both schemes the authority provides each user with a unique random string. A player U may produce a unique user name and password for each other player S using a one-way function over the random string and the IP address of S. The player does not have to maintain any information in order to reproduce the user name and password used for accessing a player S. Moreover, the player U may execute transactions with a group of players SU in two phases; in the first phase the player interacts with each server without revealing information concerning its identity and without possibly identifying linkability among the servers in SU. In the second phase the player allows linkability and therefore transaction commitment with all servers in SU, while preserving anonymity (for future transactions).

References

  1. Bach, E. and Shallit, J. 1996. Algorithmic Number Theory in Volume 1: Efficient Algorithms. MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Beimel, A. and Dolev, S. 2003. Buses for anonymous message delivery. J. Crypt. 16, 25--39.Google ScholarGoogle ScholarCross RefCross Ref
  3. Belenkiy, M., Chase, M., Kohlweiss, M., and Lysyanskaya, A. 2007. Non-Interactive anonymous credentials. IACR Cryptology ePrint Archive, rep. 2007/384.Google ScholarGoogle Scholar
  4. Camenisch, J. and Lysyanskaya, A. 2005. A formal treatment of onion routing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'05). 169--187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Camenisch, J. and Lysyanskaya, A. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, vol. 2442. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Camenisch, J. and Michels, M. 1998. Proving in zero knowledge that a number is the product of two safe primes. Basic Res. Comput. Sci. Rep. Series.Google ScholarGoogle Scholar
  7. Cooperative Computing Awards. 2012. http://w2.eff/org/awards/coop.phpGoogle ScholarGoogle Scholar
  8. Dolev, A. and Ostrovsky, R. 2000. Xor-Trees for efficient anonymous multicast and reception. ACM Trans. Inf. Syst. Secur. 3, 2, 63--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dolev, S. and Kopeetsky, M. 2009. Anonymous transactions in computer networks. In Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'09). 297--310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Feige, U., Fiat, A., and Shamir, A. 1988. Zero-Knowledge proofs of identity. J. Crypt. 1, 2. Springer, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gabber, E., Gibbons, P., Matias, Y., and Mayer, A. 1997. How to make personalized web browsing simple, secure, and anonymous. In Proceedings of the 1st International Conference on Financial Cryptography (FC'97). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Golle, P., Jakobsson, M., Juels, A., and Syverson, P. 2004. Universal re-encryption for mixnets. In Proceedings of the Cryptographer's Track at the RSA Conference. 163--178.Google ScholarGoogle Scholar
  13. Goldreich, O. 2003. Foundations of Cryptography, Volume 1. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Goldreich, O. 2003. Foundations of Cryptography, Volume 2. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lamport, L. 1981. Password authentication with insecure communication. Comm. ACM 24, 11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Le, T. V., Nguyen, K. Q., and Varadharajan, V. 1999. How to prove that a committed number is prime. In Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security Advances in Cryptology (ASIACRYPT'99). Lecture Notes in Computer Science, vol. 1716. Springer, 208--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lysyanskaya, A., Rivest, R. L., Sahai, S., and Wolf, S. 2001. Pseudonym systems. In Selected Areas in Cryptography. 184--199. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Naor, M., Ostrovsky, R., Venkatesan, R., and Yung, M. 1993. Perfect zero-knowledge arguments for NP using any one-way permutation. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'92). Lecture Notes in Computer Science, vol. 740. Springer.Google ScholarGoogle Scholar
  19. Stallings, W. 2007. Network Security Essentials: Applications and Standards. Prentice-Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Stinson, D. R. 2006. Cryptography. Theory and Practice, 3rd ed. Chapman and Hall/CRC Press.Google ScholarGoogle Scholar

Index Terms

  1. Anonymous transactions in computer networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Autonomous and Adaptive Systems
      ACM Transactions on Autonomous and Adaptive Systems  Volume 7, Issue 2
      July 2012
      275 pages
      ISSN:1556-4665
      EISSN:1556-4703
      DOI:10.1145/2240166
      Issue’s Table of Contents

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 July 2012
      • Accepted: 1 November 2010
      • Revised: 1 September 2010
      • Received: 1 February 2010
      Published in taas Volume 7, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed
    • Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader