Authors:
Jesus Diaz
1
;
David Arroyo
2
and
Francisco B. Rodriguez
2
Affiliations:
1
BEEVA, Spain
;
2
Universidad Autónoma de Madrid, Spain
Keyword(s):
Privacy Enhancing Technologies, Group Signatures, Blind Signatures.
Related
Ontology
Subjects/Areas/Topics:
Applied Cryptography
;
Cryptographic Techniques and Key Management
;
Data and Application Security and Privacy
;
Data Engineering
;
Databases and Data Security
;
Identification, Authentication and Non-Repudiation
;
Information and Systems Security
;
Privacy
;
Privacy Enhancing Technologies
;
Trust Management and Reputation Systems
Abstract:
The balance between security and privacy is a must for the adequate construction of e-democracy. For such a
goal, information and communication networks should not be hardened at the cost of lessening privacy protection
mechanisms. In addition, the deployment of such mechanisms should not pave the way for performing
malicious activities. This call for security-privacy trade-offs is specially relevant in the general scope of the
anonymizing networks, and in the specific case of the Tor network. Indeed, general security attacks are based
on anonymous network access, which makes service providers to ban this kind of connections even when they
are initiated by legitimate users. In this communication we apply group and blind signatures to address this
dilemma, allowing the incorporation of access controls to the Tor network. Our procedure is enhanced by a
protocol for denouncing illegitimate actions without eroding users’ privacy.