Threshold-based identity recovery for privacy enhanced applications

14Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

Abstract

Privacy and accountability are potentially conflicting organizational and legal requirements which can be approached by allowing users to act pseudonymously. The reidentification of pseudonyms should be bound to a legal purpose requiring accountability. Existing solutions entrust this function to third parties. Upon good cause shown, these parties perform reidentification on demand. The ability to perform reidentification should be technically bound to the actual existence of a legal purpose, which in some applications can be interpreted as the transgression of a threshold. We present an approach for constructing transaction-based pseudonyms as shares for a suitably adapted version of Shamir's cryptographic approach to secret sharing. Only if pseudonymous actions exceed a threshold specified by a predetermined purpose, can the actor's identity be recovered.

Cited by Powered by Scopus

Approximate information flows: Socially-based modeling of privacy in ubiquitous computing

91Citations
89Readers
Get full text

Pseudonymizing Unix log files

23Citations
20Readers
Get full text
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Biskup, J., & Flegel, U. (2000). Threshold-based identity recovery for privacy enhanced applications. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 71–79). Association for Computing Machinery (ACM). https://doi.org/10.1145/352600.352611

Readers over time

‘09‘10‘11‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘22‘2302468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 20

59%

Professor / Associate Prof. 9

26%

Researcher 4

12%

Lecturer / Post doc 1

3%

Readers' Discipline

Tooltip

Computer Science 33

92%

Physics and Astronomy 1

3%

Social Sciences 1

3%

Engineering 1

3%

Save time finding and organizing research with Mendeley

Sign up for free
0