2008
DOI: 10.1007/978-3-540-79966-5_5
|View full text |Cite
|
Sign up to set email alerts
|

A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup

Abstract: Abstract. An attacker who can control arbitrarily many user identities can break the security properties of most conceivable systems. This is called a "Sybil attack". We present a solution to this problem that does not require online communication with a trusted third party and that in addition preserves the privacy of honest users. Given an initial so-called Sybil-free identity domain, our proposal can be used for deriving Sybilfree unlinkable pseudonyms associated with other identity domains. The pseudonyms … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
2
2
2

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…This is possible either by restricting the issuing of pseudonyms or by providing means to detect multiple pseudonyms belonging to a same vehicle. Restricting the issuing of pseudonyms is the better approach, as it completely avoids the problem of detection, which is present in some Sybil-free pseudonym approaches [3], [20]. The proposal from Khodaei et al [17] falls into this category as it is an interactive protocol: pseudonyms are sent to a trusted third party, which is considered to be always available, so that they can be verified.…”
Section: Discussionmentioning
confidence: 99%
“…This is possible either by restricting the issuing of pseudonyms or by providing means to detect multiple pseudonyms belonging to a same vehicle. Restricting the issuing of pseudonyms is the better approach, as it completely avoids the problem of detection, which is present in some Sybil-free pseudonym approaches [3], [20]. The proposal from Khodaei et al [17] falls into this category as it is an interactive protocol: pseudonyms are sent to a trusted third party, which is considered to be always available, so that they can be verified.…”
Section: Discussionmentioning
confidence: 99%
“…To prevent profiling based on recommendation reports, a privacy-enhancing reputation system using role pseudonyms is presented in [33]. 5 The proposal is based on self-certified pseudonyms that are valid for a given context or service and it limits users to have at most one pseudonym per service [1,32], which prevents Sybil attacks and white-washing. In addition, pseudonyms issued for different services are cryptographically unlinkable.…”
Section: Provenance Reputation and Petsmentioning
confidence: 99%