Anonymous Security Systems and Applications: Requirements and Solutions

Anonymous Security Systems and Applications: Requirements and Solutions

Shinsuke Tamura (University of Fukui, Japan)
Release Date: May, 2012|Copyright: © 2012 |Pages: 265
ISBN13: 9781466616493|ISBN10: 1466616490|EISBN13: 9781466616509|DOI: 10.4018/978-1-4666-1649-3


As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual’s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers’ lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners.

Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Anonymous Auction System Development
  • Anonymous Authentication
  • Anonymous Service Components
  • Anonymous Token-Based Schemes
  • Classification of Encryption Algorithms
  • e-voting systems and civic engagement
  • Encryption and Decryption
  • Encryption Schemes for Anonymous Systems
  • Enhanced Symmetric key Based Mix-net (ESEBM)
  • Hash, Mac and Digital Signatures

Table of Contents and List of Contributors

Search this Book:
Table of Contents
Shinsuke Tamura
Shinsuke Tamura
Chapter 1
To understand the importance of secure anonymous system technologies, this chapter introduces communication, electronic payment, cloud computing... Sample PDF
Secure Anonymous Systems and Requirements
Chapter 2
As the foundation of all security enhanced systems, encryptions and decryptions are defined, and homomorphic (additive or multiplicative)... Sample PDF
Encryption and Decryption
Chapter 3
Integrity is the property of information concerning protection against its unauthorized modifications and forgeries. This chapter discusses bulletin... Sample PDF
Schemes for Digital Signatures
Chapter 4
As encryption schemes useful in developing secure anonymous systems, linear equation based encryption, probabilistic, commutative and verifiable... Sample PDF
Encryption Schemes for Anonymous Systems
Chapter 5
This chapter summarizes approaches that are adopted in this book to satisfy various requirements of secure anonymous systems listed in the 1st... Sample PDF
Approaches to Developing Secure Anonymous Systems
Chapter 6
This chapter discusses schemes to confirm that data owned by anonymous entities are legitimate ones, in other words, to protect data owned by... Sample PDF
Integrity of Anonymous Data
Chapter 7
Anonymous Communication  (pages 101-123)
Schemes of anonymous communication enable entities to send or receive their messages without disclosing their identities to others including... Sample PDF
Anonymous Communication
Chapter 8
This chapter introduces schemes for anonymous statistics calculations, in which an entity or a set of entities calculate functions of data owned by... Sample PDF
Anonymous Statistics Calculation
Chapter 9
As the first application of secure anonymous systems, after reviewing conventional schemes, this chapter develops anonymous token, ITL, and ID list... Sample PDF
Anonymous Authentication Systems
Chapter 10
An anonymous credit card system and an electronic cash (e-cash) system are developed while exploiting ITLs and anonymous tag based credentials. Both... Sample PDF
Electronic Payment Systems
Chapter 11
As elements that constitute electronic procurement systems, anonymous auction, object delivery, and object monitoring systems are developed based on... Sample PDF
Electronic Procurement Systems
Chapter 12
As one of applications in electronic governance, this chapter develops an electronic voting (e-voting) system. After discussing requirements for... Sample PDF
Electronic Governance Systems
About the Contributors

Author(s)/Editor(s) Biography

Shinsuke Tamura received the B.S., M.S. and Dr.(Eng.) degrees in Control Engineering from Osaka University in 1970, 1972 and 1991, respectively. During 1972 to 2001 he worked for Toshiba Corporation, and had been developing information systems for various applications including mechanical CAD systems, system engineering tools, manufacturing systems, power systems, railway control systems, and building, factory and office automation systems. He is currently a professor of Graduate School of Engineering, University of Fukui. His current research interests include distributed system architecture, system development methods, information security, path planning algorithms (for manipulators), and manufacturing scheduling algorithms.