Universal Re-encryption of Signatures and Controlling Anonymous Information Flow. Klonowski, M.; Kutylowski, M.; Lauks, A.; and Zagorski, F. July 2004.
Universal Re-encryption of Signatures and Controlling Anonymous Information Flow [link]Paper  abstract   bibtex   
Anonymous communication protocols, very essential for preserving privacy of the parties communicating, may lead to severe problems. A malicious server may use anonymous communication protocols for injecting unwelcome messages into the system so that their source can be hardly traced. So anonymity and privacy protection on one side and protection against such phenomena as spam are so far contradictory goals. We propose a mechanism that may be used to limit the mentioned side effects of privacy protection. During the protocol proposed each encrypted message admitted into the system is signed by a respective authority. Then, on its route through the network the encrypted message and the signature are re-encrypted universally. The purpose of universal re-encryption is to hide the routes of the messages from an observer monitoring the traffic. Despite re-encryption, signature of the authority remains valid. Depending on a particular application, verification of the signature is possible either off-line by anybody with the access to the ciphertext and the signature or requires contact with the authority that has issued the signature.
@conference {warta04-Klonowski,
	title = {Universal Re-encryption of Signatures and Controlling Anonymous Information Flow},
	booktitle = {Proceedings of WARTACRYPT {\textquoteright}04},
	year = {2004},
	month = {July},
	abstract = {Anonymous communication protocols, very essential for preserving privacy of the parties communicating, may lead to severe problems. A malicious server may use anonymous communication protocols for injecting unwelcome messages into the system so that their source can be hardly traced. So anonymity and privacy protection on one side and protection against such phenomena as spam are so far contradictory goals. We propose a mechanism that may be used to limit the mentioned side effects of privacy protection. During the protocol proposed each encrypted message admitted into the system is signed by a respective authority. Then, on its route through the network the encrypted message and the signature are re-encrypted universally. The purpose of universal re-encryption is to hide the routes of the messages from an observer monitoring the traffic. Despite re-encryption, signature of the authority remains valid. Depending on a particular application, verification of the signature is possible either off-line by anybody with the access to the ciphertext and the signature or requires contact with the authority that has issued the signature.},
	keywords = {anonymity, information hiding, privacy, re-encryption},
	url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4976},
	author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski}
}
Downloads: 0