Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project

被引:26
作者
Ardagna, Claudio A. [1 ]
Camenisch, Jan [2 ]
Kohlweiss, Markulf [3 ]
Leenes, Ronald [4 ]
Neven, Gregory [2 ]
Priem, Bart [4 ]
Samarati, Pierangela [1 ]
Sommer, Dieter [2 ]
Verdicchio, Mario [2 ,5 ]
机构
[1] Univ Milan, Milan, Italy
[2] IBM Zurich Res Lab, Zurich, Switzerland
[3] Katholieke Univ Leuven, Louvain, Belgium
[4] Univ Tilburg, Tilburg, Netherlands
[5] Univ Bergamo, Bergamo, Italy
关键词
Privacy policies; access control; data handling; identity management; anonymous credentials;
D O I
10.3233/JCS-2010-0367
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIME (Privacy and Identity Management for Europe) envisions that individuals will be able to interact in this information society in a secure and safe way while retaining control of their privacy. The project had set out to prove that existing privacy-enhancing technologies allow for the construction of a user-controlled identity management system that comes surprisingly close to this vision. This paper describes two key elements of the PRIME identity management systems: anonymous credentials and policy languages that fully exploit the advanced functionality offered by anonymous credentials. These two key elements enable the users to carry out transactions, e.g., over the Internet, revealing only the strictly necessary personal information. Apart from presenting for the first time these two key results, this paper also motivates the need for privacy enhancing identity management, gives concrete requirements for such a system and then describes the key principles of the PRIME identity management solution.
引用
收藏
页码:123 / 160
页数:38
相关论文
共 73 条
  • [1] Ahn G.J., 2005, P 2005 WORKSH DIG ID, P28, DOI DOI 10.1145/1102486.1102492
  • [2] [Anonymous], 2005, SACMAT 05 P 10 ACM S, P139
  • [3] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [4] Ardagna C. A., 2006, P 2006 ACM S INF COM, P212
  • [5] Ardagna CA, 2005, LECT NOTES COMPUT SC, V3654, P16
  • [6] Ashley P., 2002, P 2002 ACM WORKSHOP, P103, DOI 10.1145/644527.644538
  • [7] Ashley P., 2003, IBM RES
  • [8] Optimistic fair exchange of digital signatures
    Asokan, N
    Shoup, V
    Waidner, M
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) : 593 - 610
  • [9] Backes M., 2005, P 2005 ACM WORKSH PR, P40
  • [10] Berthold O, 2000, LECT NOTES COMPUTER, V2009, P115, DOI DOI 10.1007/3-540-44702-4_7