PRIVACY PROTECTION FOR USER AUTHENTICATION

Jan Hajny, Tomas Pelka, Vaclav Zeman

Abstract

The paper deals with Internet user privacy. We focus on the protection of user identity during an Internet service use. We start with an overview of systems for the anonymous channel creation. Such channels are necessary as any solution for the identity protection will have to work with the TCP/IP protocols used in the Internet. In the second part of the paper we argue about the need for an anonymous authentication introduction. Such a service is almost missing in the current Internet. We show how the concept of anonymous authentication could improve privacy and identity protection. Finally we introduce our concept for anonymous authentication with the feature of a malicious user detection.

References

  1. Berthold, O., Federrath, H., and Köpsell, S. (2001). Web mixes. In International workshop on Designing privacy enhancing technologies, pages 115-129, New York, NY, USA. Springer-Verlag New York, Inc.
  2. Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90.
  3. Cramer, R. (1996). Modular Design of Secure, yet Practical Cryptographic Protocols. PhD thesis, University of Amsterdam.
  4. Dingledine, R. (2009). Tor: anonymity online. World Wide Web electronic publication.
  5. Reed, M. G., Syverson, P. F., and Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16:482-494.
  6. Reiter, M. K. and Rubin, A. D. (1998). Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur., 1(1):66-92.
Download


Paper Citation


in Harvard Style

Hajny J., Pelka T. and Zeman V. (2010). PRIVACY PROTECTION FOR USER AUTHENTICATION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 90-93. DOI: 10.5220/0002981300900093


in Bibtex Style

@conference{secrypt10,
author={Jan Hajny and Tomas Pelka and Vaclav Zeman},
title={PRIVACY PROTECTION FOR USER AUTHENTICATION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={90-93},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002981300900093},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - PRIVACY PROTECTION FOR USER AUTHENTICATION
SN - 978-989-8425-18-8
AU - Hajny J.
AU - Pelka T.
AU - Zeman V.
PY - 2010
SP - 90
EP - 93
DO - 10.5220/0002981300900093