Anonymous Security Systems and Applications: Requirements and Solutions

Anonymous Security Systems and Applications: Requirements and Solutions

Shinsuke Tamura (University of Fukui, Japan)
Release Date: May, 2012|Copyright: © 2012 |Pages: 265
ISBN13: 9781466616493|ISBN10: 1466616490|EISBN13: 9781466616509|DOI: 10.4018/978-1-4666-1649-3
Hardcover + Free E-Book:
E-Book Only:
Free Lifetime E-Book Access with Hardcover Purchase
IGI Global is now offering Free Lifetime E-Access with Print Purchase of any book or journal subscription. In addition to the print copy purchased, this unprecedented offer provides libraries and individuals alike the ability to access the purchased publication through the award winning InfoSci® platform. The InfoSci® platform offers unlimited simultaneous access to full HTML and PDF viewing with the ability to save, print, copy, and paste! No hidden fees! No limitations! Learn More.

Immediate e-access available to existing InfoSci® customers. New customers will be provided access within 48 hours from purchase.


As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual’s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers’ lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners.

Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Topics Covered

  • Anonymous Auction System Development
  • Anonymous Authentication
  • Anonymous Service Components
  • Anonymous Token-Based Schemes
  • Classification of Encryption Algorithms
  • e-voting systems and civic engagement
  • Encryption and Decryption
  • Encryption Schemes for Anonymous Systems
  • Enhanced Symmetric key Based Mix-net (ESEBM)
  • Hash, Mac and Digital Signatures

Table of Contents and List of Contributors

Search this Book:
Table of Contents
Shinsuke Tamura
Shinsuke Tamura
Chapter 1
To understand the importance of secure anonymous system technologies, this chapter introduces communication, electronic payment, cloud computing... Sample PDF
Secure Anonymous Systems and Requirements
Chapter 2
As the foundation of all security enhanced systems, encryptions and decryptions are defined, and homomorphic (additive or multiplicative)... Sample PDF
Encryption and Decryption
Chapter 3
Integrity is the property of information concerning protection against its unauthorized modifications and forgeries. This chapter discusses bulletin... Sample PDF
Schemes for Digital Signatures
Chapter 4
As encryption schemes useful in developing secure anonymous systems, linear equation based encryption, probabilistic, commutative and verifiable... Sample PDF
Encryption Schemes for Anonymous Systems
Chapter 5
This chapter summarizes approaches that are adopted in this book to satisfy various requirements of secure anonymous systems listed in the 1st... Sample PDF
Approaches to Developing Secure Anonymous Systems
Chapter 6
This chapter discusses schemes to confirm that data owned by anonymous entities are legitimate ones, in other words, to protect data owned by... Sample PDF
Integrity of Anonymous Data
Chapter 7
Anonymous Communication  (pages 101-123)
Schemes of anonymous communication enable entities to send or receive their messages without disclosing their identities to others including... Sample PDF
Anonymous Communication
Chapter 8
This chapter introduces schemes for anonymous statistics calculations, in which an entity or a set of entities calculate functions of data owned by... Sample PDF
Anonymous Statistics Calculation
Chapter 9
As the first application of secure anonymous systems, after reviewing conventional schemes, this chapter develops anonymous token, ITL, and ID list... Sample PDF
Anonymous Authentication Systems
Chapter 10
An anonymous credit card system and an electronic cash (e-cash) system are developed while exploiting ITLs and anonymous tag based credentials. Both... Sample PDF
Electronic Payment Systems
Chapter 11
As elements that constitute electronic procurement systems, anonymous auction, object delivery, and object monitoring systems are developed based on... Sample PDF
Electronic Procurement Systems
Chapter 12
As one of applications in electronic governance, this chapter develops an electronic voting (e-voting) system. After discussing requirements for... Sample PDF
Electronic Governance Systems
About the Contributors

Author(s)/Editor(s) Biography

Shinsuke Tamura received the B.S., M.S. and Dr.(Eng.) degrees in Control Engineering from Osaka University in 1970, 1972 and 1991, respectively. During 1972 to 2001 he worked for Toshiba Corporation, and had been developing information systems for various applications including mechanical CAD systems, system engineering tools, manufacturing systems, power systems, railway control systems, and building, factory and office automation systems. He is currently a professor of Graduate School of Engineering, University of Fukui. His current research interests include distributed system architecture, system development methods, information security, path planning algorithms (for manipulators), and manufacturing scheduling algorithms.