Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990.Type:Proceedings
Date Reviewed: Jan 1 1992

Chaum establishes a procedure for engaging in transactions with organizations that protect the privacy of the individual and yet allow the necessary transfer of information. He makes two initial assumptions and then relaxes them later for further usage of the system. First, each individual is allowed at most one relationship per organization. Second, only a particular organization has the power to create pseudonyms or to issue credentials.

In the first part of the paper, the author presents the basic system via analogy, then he gives the actual system using digital signatures. The second section details how pseudonyms are authorized and relaxes the second assumption. Section 3 relaxes the first assumption and illustrates the results with applications. Section 4 discusses transforming and combining credentials. The paper concludes with Section 5, describing how users can maintain exclusive control over the database of their own relationships. The heart of the paper is the use of data encryption methods to develop a system that protects privacy and maintains security but allows individuals to enjoy the benefits of sharing information.

The tool used is classical mathematics--modular arithmetic and group theory. He uses these classical methods skillfully to present a method that appears to be remarkably original, innovative, and effective. The section on validators, that is, “persons establishing pseudonyms with organizations by means of signatures,” is well done and creative.

The paper as I received it contains no reading list or documentation of the survey of the literature. Although the author lists sources of research by citation number, I did not have the bibliography of citations at the end of the paper. I found that uncomfortable. Perhaps the list was contained somewhere else in the proceedings, which I did not receive.

The paper is well written. If one is interested in data encryption methods, privacy and security of documents, or the mathematics of setting up such a system, this paper will be most interesting.

Reviewer:  James Van Speybroeck Review #: CR115150
Bookmark and Share
  Featured Reviewer  
 
Authentication (D.4.6 ... )
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Network Protocols (C.2.2 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
A taxonomy of computer program security flaws
Landwehr C. (ed), Bull A., McDermott J., Choi W. ACM Computing Surveys 26(3): 211-254, 1994. Type: Article
May 1 1995
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy