identity stays hidden. The traceability is required
for a user responsibility. It is in a direct contrast to
anonymity and that is why we want it to be spread
among more entities which must cooperate to reveal a
malicious user identity. Our assumption is that more
entities must agree to break anonymity thus the trace-
ability is available only in justified cases.
4 OUR CONTRIBUTION
We decided to use e-cash systems to provide anony-
mous authentication. We find the ability to create an
anonymous e-coin spendable at the e-shop very useful
for authentication. There is also a very important fea-
ture of double-spender detection available at e-cash
systems. It provides the bank with the possibility to
reveal identity of a user who spent an e-coin twice.
That is why the bank is always sure that the user ei-
ther used the coin only once or the bank is able to
learn his identity in the case of multiple spending.
Our approach uses an e-coin as an authentication
token. The user must provide the verifier with a valid
e-coin (token) and the knowledge of its construction.
If everything is accepted by the verifier the user is suc-
cessfully authenticated because the token is valid thus
released by the administrator of tokens who release
tokens only to valid users (similarly the bank releases
coins only to users with bank accounts). The com-
pleteness and soundness features are directly fulfilled
by e-cash system properties. No user identity is re-
leased as the e-coin (token) is unlinkable to the user.
The only problem is with the spread traceability. We
solved the problem by using the double spender de-
tection feature. The user uses the e-coin (token) at a
newly defined public authority entity which signs the
token. Then the user uses the token for authentica-
tion for the second time. That is why he is a double
spender so his identity can be revealed but only if the
public authority and the verifier cooperate. Neither
the verifier nor public authority is able to break user
anonymity alone.
Currently we are working on a scheme described in
this paper. We use Σ-protocols (Cramer, 1996) as
cryptographic primitives and that is why we get very
good efficiency. We expect the authentication proto-
col to be able to run in a smartcard environment.
5 CONCLUSIONS
The purpose of this paper is to point out to insuffi-
cient privacy in the Internet and to introduce tools
for improving user privacy. We distinguished two
steps for providing user anonymity. The first one is
anonymous routing which give users the possibility to
anonymously communicate. There are practical tools
to use. We expect the TOR protocol to be the choice
for most implementations as it is both secure and us-
able for multipurpose traffic. The second step for pro-
viding anonymity is unsolved yet. We propose the
concept of anonymous authentication which allows
users to use not only open services but also services
which require some form of user authorization. Ac-
cording to our future plans we would like to imple-
ment more features to our anonymous authentication
scheme. Our goal is to provide provable security on a
smartcard platform.
ACKNOWLEDGEMENTS
Sponsored under the National Program of Research
II by the Ministry of Education, Youth and Sports of
the Czech Republic in 2C08002 Project - KAAPS Re-
search of Universal and Complex Authentication and
Authorization for Permanent and Mobile Computer
Networks.
Jan Hajny is a holder of the Brno Stipend for Tal-
ented Doctoral Students.
REFERENCES
Berthold, O., Federrath, H., and K
¨
opsell, S. (2001). Web
mixes. In International workshop on Designing pri-
vacy enhancing technologies, pages 115–129, New
York, NY, USA. Springer-Verlag New York, Inc.
Chaum, D. L. (1981). Untraceable electronic mail, return
addresses, and digital pseudonyms. Commun. ACM,
24(2):84–90.
Cramer, R. (1996). Modular Design of Secure, yet Practical
Cryptographic Protocols. PhD thesis, University of
Amsterdam.
Dingledine, R. (2009). Tor: anonymity online. World Wide
Web electronic publication.
Hajny, J., Pelka, T., and Lambertova, P. (2009). Flexi-
ble Authentication Framework. In 2009 INTERNA-
TIONAL CONFERENCE ON NETWORK AND SER-
VICE SECURITY, pages 29–33. IEEE.
Reed, M. G., Syverson, P. F., and Goldschlag, D. M.
(1998). Anonymous connections and onion routing.
IEEE Journal on Selected Areas in Communications,
16:482–494.
Reiter, M. K. and Rubin, A. D. (1998). Crowds: anonymity
for web transactions. ACM Trans. Inf. Syst. Secur.,
1(1):66–92.
PRIVACY PROTECTION FOR USER AUTHENTICATION
93