You are previewing Anonymous Security Systems and Applications.
O'Reilly logo
Anonymous Security Systems and Applications

Book Description

As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual’s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers’ lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Preface
    1. SECTION 1
    2. SECTION 2
    3. SECTION 3
  5. Acknowledgment
  6. Section 1: Introduction
    1. Chapter 1: Secure Anonymous Systems and Requirements
      1. ABSTRACT
      2. INTRODUCTION
      3. COMMUNICATION SYSTEMS
      4. ELECTRONIC PAYMENT
      5. CLOUD COMPUTING
      6. ELECTRONIC GOVERNANCE
      7. CONCLUSION
    2. Chapter 2: Encryption and Decryption
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITION AND DESIRABLE FEATURES
      4. SYMMETRIC KEY ENCRYPTION ALGORITHMS
      5. ASYMMETRIC KEY ENCRYPTION ALGORITHMS
      6. RSA
      7. CONCLUSION
    3. Chapter 3: Schemes for Digital Signatures
      1. ABSTRACT
      2. INTRODUCTION
      3. BULLETIN BOARD (BB)
      4. HASHES, MACS AND DIGITAL SIGNATURES
      5. CONCLUSION
    4. Chapter 4: Encryption Schemes for Anonymous Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. LINEAR EQUATION BASED ENCRYPTION SCHEME
      4. PROBABILISTIC, COMMUTATIVE, AND VERIFIABLE RE-ENCRYPTION
      5. THRESHOLD ELGamal ENCRYPTION SCHEME
      6. CONCLUSION
  7. Section 2: Data and Communication Security in Anonymous Systems
    1. Chapter 5: Approaches to Developing Secure Anonymous Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. HOMOMORPHIC ENCRYPTION FUNCTIONS AND BLIND CALCULATIONS
      4. COMMUTATIVE ENCRYPTION FUNCTIONS AND BLIND SIGNATURES
      5. CONCLUSION
    2. Chapter 6: Integrity of Anonymous Data
      1. ABSTRACT
      2. INTRODUCTION
      3. BLIND SIGNATURES
      4. UNLINKABLE SIGNATURES
      5. IMPLICIT TRANSACTION LINKS
      6. TOKENS
      7. ANONYMOUS TAGS
      8. CHALLENGE AND RESPONSE PROTOCOLS
      9. CONCLUSION
    3. Chapter 7: Anonymous Communication
      1. ABSTRACT
      2. INTRODUCTION
      3. CROWDS
      4. DC NET
      5. MIX-NET
      6. ESEBM (ENHANCED SYMMETRIC KEY ENCRYPTION BASED MIX-NET)
      7. ONION ROUTING
      8. RECEIVER AND MUTUALLY ANONYMOUS COMMUNICATION
      9. CONCLUSION
    4. Chapter 8: Anonymous Statistics Calculation
      1. ABSTRACT
      2. INTRODUCTION
      3. BLIND SUM/PRODUCT CALCULATION SCHEME
      4. MULTI PARTY COMPUTATIONS
      5. CONCLUSION
  8. Section 3: Developing Secure Anonymous Systems
    1. Chapter 9: Anonymous Authentication Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. CONVENTIONAL MECHANISMS
      4. ANONYMOUS TOKEN BASED AUTHENTICATION
      5. ITL BASED AUTHENTICATION
      6. ID LIST BASED AUTHENTICATION
      7. ANONYMOUS CREDENTIALS AND ANONYMOUS TAGS
      8. CONCLUSION
    2. Chapter 10: Electronic Payment Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. ANONYMOUS CREDIT CARD SYSTEMS
      4. ELECTRONIC CASH (E-CASH) SYSTEMS
      5. CONCLUSION
    3. Chapter 11: Electronic Procurement Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. ANONYMOUS AUCTION SYSTEMS
      4. ANONYMOUS OBJECT DELIVERY AND MONITORING SYSTEMS
      5. CONCLUSION
    4. Chapter 12: Electronic Governance Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. REQUIREMENTS FOR E-VOTING SYSTEMS
      4. DEVELOPMENT OF AN E-VOTING SYSTEM
      5. CONCLUSION
  9. Compilation of References
  10. About the Author