Sciweavers

SSS
2009
Springer

Anonymous Transactions in Computer Networks

14 years 6 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft. In both schemes the authority provides each user with a unique random string. A player U may produce unique user name and password f...
Shlomi Dolev, Marina Kopeetsky
Added 27 May 2010
Updated 27 May 2010
Type Conference
Year 2009
Where SSS
Authors Shlomi Dolev, Marina Kopeetsky
Comments (0)