A New Paradigm for Individuals in the Information Age

@article{Chaum1984ANP,
  title={A New Paradigm for Individuals in the Information Age},
  author={David Chaum},
  journal={1984 IEEE Symposium on Security and Privacy},
  year={1984},
  pages={99-99}
}
  • D. Chaum
  • Published 1 April 1984
  • Computer Science
  • 1984 IEEE Symposium on Security and Privacy
Today, individuals provide substantially the same identifying information to each organization with which they have a relationship. In a new paradigm, individuals provide different "pseudonyms" or alternate names to each organization. A critical advantage of systems based on such pseudonyms is that the information associated with each pseudonym can be insufficient to allow data on an individual to be linked and collected together, and thus they can prevent the formation of a dossier society… 

Authenticity Anonymity and Security in OSIS - an open System for Information Services

  • S. Herda
  • Computer Science
    Datenschutz und Datensicherung
  • 1985
OSIS aims to open the market by providing the customers and service suppliers with the digital signature facility to sign orders, acknowledge oders, requests for payments, payments, etc.

Many-Time Restrictive Blind Signatures

It turns out that many-time restrictive blind signatures meet the specification, and a first implementation of this new class of signature schemes is presented, which uses no hash function, is about half as efficient as previous one-time restricted blind signatures and its security rests on a similar assumption as selective unforgeability of the pure ElGamal signature scheme.

Practical versus moral identities in identity management

Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity

Offline Personal Credentials

This work presents the first efficient cryptographic solution that prevents transfer of personal credentials under reasonable biometric assumptions, allows to use credentials arbitrarily often, and protects the individuals’ privacy unconditionally.

Biometric yet Privacy Protecting Person Authentication

This work draft cryptographic protocols for issuing and showing non-transferable yet privacy protecting certificates, and assumes for each owner a kind of pilot that is equipped with a tamper resistant biometric authentication facility.

Radio Frequency Identification: Adversary Model and Attacks on Existing Protocols

This paper defines the notions of existential and universal untraceability and the access to the communication channels from a set of oracles and proposes an adversary model suitable for RFID environments that fits the problem being considered and allows a formal analysis of the protocols in terms of traceability.

A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers

This paper presents a novel, publicly verifiable mixing scheme which has everlasting privacy towards observers: all the information published on the bulletin board by the mixes reveals no information about the identity of any of the messages published.

Adversarial Model for Radio Frequency Identification

The notions of existential and universal untraceability are defined and the access to the communication channels from a set of oracles are modeled and it is shown that this formalisation fits the problem being considered and allows a formal analysis of the protocols in terms of traceability.

Networks without user observability

Cryptographic Protocol for Trustable Match Making

The protocol uses an authentication scheme that provides the desired degree of anonymity and authentication and is used to detect active attackers, and to camouflage information that cannot be hidden cryptographically.

References

A high security log-in procedure

It is suggested that for the protection of time sharing systems from unauthorized users polynomials over a prime modulus are superior to one-way ciphers derived from Shannon codes.