Revocable Privacy: Principles, Use Cases, and Technologies

Security and privacy often seem to be at odds with one another. In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences for people who do violate the rule. We first improve the definition of revocable privacy by considering different types of sensors for users’ actions and different types of consequences of violating the rules (for example blocking). Second, we explore some use cases that can benefit from a revocable privacy approach. For each of these, we derive the underlying abstract rule that users should follow. Finally, we describe existing techniques that can implement some of these abstract rules. These descriptions not only illustrate what can already be accomplished using revocable privacy, they also reveal directions for future research.

[1]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[2]  Jan Camenisch,et al.  Compact E-Cash , 2005, EUROCRYPT.

[3]  Jaap-Henk Hoepman,et al.  Forward-Secure Distributed Encryption , 2014, Privacy Enhancing Technologies.

[4]  Dan Bogdanov,et al.  How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation , 2015, Financial Cryptography.

[5]  Ian Goldberg,et al.  Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting , 2013, WPES.

[6]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[7]  Jaap-Henk Hoepman,et al.  Revocable Privacy 2011 – use cases , 2012 .

[8]  Markus Stadler,et al.  Cryptographic protocols for revocable privacy , 1996 .

[9]  Jaap-Henk Hoepman,et al.  Non-interactive distributed encryption: a new primitive for revocable privacy , 2011, WPES.

[10]  Essam Ghadafi Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability , 2014, LATINCRYPT.

[11]  Jan Camenisch,et al.  How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.

[12]  Sean W. Smith,et al.  Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.

[13]  Willy Susilo,et al.  Short E-Cash , 2005, INDOCRYPT.

[14]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[15]  Joachim Biskup,et al.  Recent Advances in Intrusion Detection , 2000, Lecture Notes in Computer Science.

[16]  Sean W. Smith,et al.  Nymble: Blocking Misbehaving Users in Anonymizing Networks , 2011, IEEE Transactions on Dependable and Secure Computing.