Auditable Anonymous Delegation

The contribution of this paper is an alternative mechanism for delegation, whereby users can share their credentials in such a way that it is difficult for the delegatee to re-use credentials of the delegator. An auditor in our protocol can link actions to individuals from the audit records but cannot forge audit records. We do not greatly restrict the choice of the delegation model semantics which can be adopted. Although the primary aim of our protocol is to provide support for anonymous delegation, it is still useful even if anonymity is not required at all, because of the ability to weaken trust assumptions.

[1]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[2]  Bruce Christianson,et al.  Anonymous Authentication , 2004, Security Protocols Workshop.

[3]  Bruce Christianson,et al.  Binding Bit Patterns to Real World Entities , 1997, Security Protocols Workshop.

[4]  Paul F. Syverson,et al.  Authentic Attributes with Fine-Grained Anonymity Protection , 2000, Financial Cryptography.

[5]  Jan Camenisch,et al.  Design and implementation of the idemix anonymous credential system , 2002, CCS '02.

[6]  Bruce Christianson,et al.  Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers , 2006, Security Protocols Workshop.

[7]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[8]  Bruce Schneier,et al.  Ten Risks of PKI , 2004 .

[9]  Bruce Christianson,et al.  Secure Sessions from Weak Secrets , 2003, Security Protocols Workshop.

[10]  Bruce Christianson,et al.  Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Paul F. Syverson,et al.  Unlinkable serial transactions: protocols and applications , 1999, TSEC.

[13]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[14]  Bruno Crispo Delegation of Responsibility (Transcript of Discussion) , 1998, Security Protocols Workshop.

[15]  Partha Das Chowdhury Anonymity and trust in the electronic world , 2005 .

[16]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[17]  Jeffrey C. Lagarias,et al.  Cryptology and Computational Number Theory , 1997 .

[18]  Bruce Christianson,et al.  Anonymous Context Based Role Activation Mechanism , 2005, Security Protocols Workshop.

[19]  Amit Sahai,et al.  Pseudonym Systems , 1999, Selected Areas in Cryptography.