期刊文献+

一种有效的匿名分析算法 被引量:1

An Efficient Anonymity Analysis Algorithm
下载PDF
导出
摘要 匿名是保护用户隐私的主要方法。当前的研究主要集中在设计具体匿名方案,较少涉及如何评估匿名机制的匿名性。本文根据匿名与不可关联性具有紧密的关系,设计了一套完备的匿名性推理系统,在此基础上给出了匿名分析算法。该算法能够发现隐藏的匿名漏洞,有效地评估现有匿名机制的安全性,并为设计一个新的匿名保护方案提供支持。 Anonymity is the main approach to protect users' privacy. Currently researches mainly concentrate on the concrete anonymity schemes, but seldom concern how to evaluate the security of an anonymity mechanism. In this paper, a complete anonymity reasoning system is addressed that it relies on the closely relationship between anonymity and unlinkability. Based on the anonymity reasoning system, an anonymity analysis algorithm is designed, which it can find out the concealing anonymity exposure, can evaluate and analyze the security of the anonymous mechanism, and can help design a new anonymity protection scheme.
出处 《计算机科学》 CSCD 北大核心 2007年第11期56-57,73,共3页 Computer Science
基金 中国博士后基金(20070410953) 湖北省自然科学基金(2005ABA243)资助
关键词 匿名 不可关联性 隐私 Anonymity, Unlinkability, Privacy
  • 相关文献

参考文献8

  • 1Chaum D L.Untraceable electronic mail,return addresses,and digital pseudonyms.Communications of the ACM,1981,24(2):84-88
  • 2Reiter M,Rubin A D.Crowds:anonymity for Web transactions.ACM Transactions on Information and System Security,1998,1(1):66-92
  • 3Ren K,Lou W,Kim K,et al.A novel privacy preserving authentication and access control scheme for pervasive computing environments.IEEE Transactions on Vehicular Technology,2006,55(4):1373-1384
  • 4Konidala D M,Duc D N,Kim K.A capability-based privacy-preserving scheme for pervasive computing environments.In:Proc.IEEE International Workshop on Pervasive Computing and Communication Security,2005.8-12
  • 5Wu X.Applying pseudonimity for anonymous data delivery in location-aware mobile ad hoc networks.IEEE Transactions on Vehicular Technology,2006,55(3):1062-1073
  • 6Kobsa A,Schreck J.Privacy through pseudonymity in user-adaptive systems.ACM Transactions on Internet Technology,2003,3(2):149-183
  • 7Zugenmaier A,Kreutzer M,Muller G.The freiburg privacy diamond:an attacker model for a mobile computing environment.In:Kommunikation in Verteilten Systemen (KiVS) '03,2003
  • 8Iachello G,Truong K N,Abowd G D,et al.Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world.In:Proc.ACM Conference on Human Factors in Computing Systems,New York:ACM Press,2006.1009-1018

同被引文献5

  • 1Y Guan,X Fu,R Bettati,W Zhao. An optimal strategy for anonymous communication protocols[A].Vienna:IEEE Computer Press,2002.257-266.
  • 2D L Chaum. Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,(02):84-88.
  • 3Y.Deng,C.Palamidessi,J.Pang. Weak Probabilistic Anonymity[J].Journal of Electronic Notes in Theoretical Computer Science,2007,(01):55-76.
  • 4V Shmatikov MH Wang. Measuring Relationship Anonymity in Mix Networks[A].New York:acm Press,2006.59-62.
  • 5G Iachello,K N Trnong,G D Abowd. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world[A].New York:acm Press,2006.1009-1018.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部