Current and future privacy enhancing technologies for the internet

作者: Yves Deswarte , Carlos Aguilar Melchor

DOI: 10.1007/BF03219914

关键词: Computer securityInformation protection policyPrivacy by DesignIdentity managementPrivacy softwareAuthenticationThe InternetData managementPrivacy-enhancing technologiesEngineering

摘要: This paper presents an overview of the current and next solutions for privacy protection on Internet. We highlight five categories Privacy Enhancing Technologies (Pets). First, we introduce multiple virtual identities that can represent a person, way person manage them. Then, focus untraceability problem, which has been major field research since very first papers in early eighties. Anonymous access to services will be central point third category pets consider. To complete this overview, describe future authorization pets, finish by presentation personal data management. For each these present some technologies most promising ones under development.

参考文章(23)
Helger Lipmaa, An oblivious transfer protocol with log-squared communication international conference on information security. pp. 314- 328 ,(2005) , 10.1007/11556992_23
David Goldschlag, Paul Syverson, Michael Reed, Onion Routing for Anonymous and Private Internet Connections ,(1999)
Claudia Diaz, Bart Preneel, Taxonomy of Mixes and Dummy Traffic Working Conference on Privacy and Anonymity in Networked and Distributed Systems. pp. 217- 232 ,(2004) , 10.1007/1-4020-8145-6_18
David Chaum, Blind Signatures for Untraceable Payments international cryptology conference. pp. 199- 203 ,(1983) , 10.1007/978-1-4757-0602-4_18
Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier, Smartcard-Based Anonymization smart card research and advanced application conference. pp. 49- 66 ,(2004) , 10.1007/1-4020-8147-2_4
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Julien P. Stern, A New Efficient All-Or-Nothing Disclosure of Secrets Protocol international cryptology conference. ,vol. 1514, pp. 357- 371 ,(1998) , 10.1007/3-540-49649-1_28
Brian Neil Levine, Clay Shields, Hordes: a multicast based protocol for anonymity Journal of Computer Security. ,vol. 10, pp. 213- 240 ,(2002) , 10.3233/JCS-2002-10302
Philippe Golle, Ari Juels, Dining Cryptographers Revisited theory and application of cryptographic techniques. pp. 456- 473 ,(2004) , 10.1007/978-3-540-24676-3_27
Jan Camenisch, Ernie Brickell, Ernie Brickell, Liqun Chen, Direct anonymous attestation computer and communications security. pp. 132- 145 ,(2004) , 10.1145/1030083.1030103