Abstract. An attacker who can control arbitrarily many user identities can break the security properties of most conceivable systems. This is called a “Sybil attack”. We present a solution to this problem that does not require online communication with a trusted third party and that in addition preserves the privacy of honest users. Given an initial so-called Sybil-free identity domain, our proposal can be used for deriving Sybil-free unlinkable pseudonyms associated with other identity domains. The pseudonyms are self-certified and computed by the users themselves from their cryptographic long-term identities.
The growing use of online services advocated the emergence of digital identity as a mechanism of dat...
Part 2: Full PapersInternational audienceAn integral component of almost any security and trust syst...
To support emerging online activities within the digital information infrastructure, such as commerc...
Abstract. An attacker who can control arbitrarily many user identities can break the security proper...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms ...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
Abstract—Any decentralized distributed network is particularly vulnerable to the Sybil attack wher...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
We develop solutions for the security and privacy of user iden-tity information in a federation. By ...
Today, digital identity management for individuals is either inconvenient and error-prone or creates...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
The growing use of online services advocated the emergence of digital identity as a mechanism of dat...
Part 2: Full PapersInternational audienceAn integral component of almost any security and trust syst...
To support emerging online activities within the digital information infrastructure, such as commerc...
Abstract. An attacker who can control arbitrarily many user identities can break the security proper...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms ...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
Abstract—Any decentralized distributed network is particularly vulnerable to the Sybil attack wher...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
We develop solutions for the security and privacy of user iden-tity information in a federation. By ...
Today, digital identity management for individuals is either inconvenient and error-prone or creates...
Part 3: Access Control, Trust and Identity ManagementInternational audienceThe use of deception to e...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
The growing use of online services advocated the emergence of digital identity as a mechanism of dat...
Part 2: Full PapersInternational audienceAn integral component of almost any security and trust syst...
To support emerging online activities within the digital information infrastructure, such as commerc...