Linking anonymous transactions: the consistent view attack

Andreas Pashalidis, Bernd Meyer

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Abstract

In this paper we study a particular attack that may be launched by cooperating organisations in order to link the transactions and the pseudonyms of the users of an anonymous credential system. The results of our analysis are both positive and negative. The good (resp. bad) news, from a privacy protection (resp. evidence gathering) viewpoint, is that the attack may be computationally intensive. In particular, it requires solving a problem that is polynomial time equivalent to ALLSAT . The bad (resp. good) news is that a typical instance of this problem may be efficiently solvable.

Original languageEnglish
Title of host publicationPrivacy Enhancing Technologies - 6th International Workshop, PET 2006, Revised Selected Papers
PublisherSpringer
Pages384-392
Number of pages9
ISBN (Print)3540687904, 9783540687900
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event6th International Workshop on Privacy Enhancing Technologies, PET 2006 - Cambridge, United Kingdom
Duration: 28 Jun 200630 Jun 2006

Conference

Conference6th International Workshop on Privacy Enhancing Technologies, PET 2006
CountryUnited Kingdom
CityCambridge
Period28/06/0630/06/06

Cite this