Anonymous Group Communication in Mobile Networks

In this paper we propose efficient schemes enabling groups of users of a mobile network to communicate anonymously with respect to an adversarial party (i.e, other users, network managers, and so on). Each user can start a group communication, and his identity, as well as the identities of the other members of the group, are not revealed even if several other parties of the system collude. We consider two network settings and, for each of them, we propose an efficient and secure scheme.

[1]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[2]  Levente Buttyán,et al.  Accountable anonymous access to services in mobile communication systems , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[3]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[4]  Qi Shi,et al.  Achieving user privacy in mobile networks , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[5]  Paul F. Syverson,et al.  Unlinkable serial transactions: protocols and applications , 1999, TSEC.

[6]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[7]  Hannes Federrath,et al.  MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.

[8]  Peter Reichl,et al.  Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks , 1998, ESORICS.

[9]  Chee Kheong Siew,et al.  A secure and efficient conference scheme for mobile communications , 2003, IEEE Trans. Veh. Technol..

[10]  Dieter Gollmann,et al.  Computer Security — ESORICS 98 , 1998, Lecture Notes in Computer Science.

[11]  Alfredo De Santis,et al.  On secret set schemes , 2000, Inf. Process. Lett..

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Gene Tsudik,et al.  Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[15]  Birgit Pfitzmann,et al.  ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.

[16]  David A. Cooper,et al.  Preserving privacy in a network of mobile computers , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[17]  Gene Tsudik,et al.  Secret Sets and Applications , 1998, Inf. Process. Lett..

[18]  Hannes Federrath,et al.  Security in Public Mobile Communication Networks , 1995 .

[19]  Paul F. Syverson,et al.  Protocols Using Anonymous Connections: Mobile Applications , 1997, Security Protocols Workshop.