User-generated pseudonyms through Merkle trees

09/08/2021
by   Georgios Kermezis, et al.
0

A pseudonymisation technique based on Merkle trees is described in this paper. More precisely, by exploiting inherent properties of the Merkle trees as cryptographic accumulators, we illustrate how user-generated pseudonyms can be constructed, without the need of a third party. Each such pseudonym, which depends on several user's identifiers, suffices to hide these original identifiers, whilst the unlinkability property between any two different pseudonyms for the same user is retained; at the same time, this pseudonymisation scheme allows the pseudonym owner to easily prove that she owns a pseudonym within a specific context, without revealing information on her original identifiers. Compared to other user-generated pseudonymisation techniques which utilize public key encryption algorithms, the new approach inherits the security properties of a Merkle tree, thus achieving post-quantum security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2021

Uncloneable Encryption, Revisited

Uncloneable encryption, introduced by Broadbent and Lord (TQC'20), is an...
research
09/05/2018

Multi-Client Order-Revealing Encryption

Order-revealing encryption is a useful cryptographic primitive that prov...
research
06/13/2023

Public-Key Encryption with Quantum Keys

In the framework of Impagliazzo's five worlds, a distinction is often ma...
research
10/08/2019

A framework for quantum homomorphic encryption with experimental demonstration

Quantum homomorphic encryption (QHE) is an encryption method that allows...
research
12/10/2021

An Evaluation and Enhancement of Seredynski-Bouvry CA-based Encryption Scheme

In this paper, we study a block cipher based on cellular automata, propo...
research
09/23/2018

Insufficient properties of image encryption algorithms

We analyze the security of recently proposed image encryption scheme [1]...
research
07/03/2020

Team voyTECH: User Activity Modeling with Boosting Trees

This paper describes our winning solution for the ECML-PKDD ChAT Discove...

Please sign up or login with your details

Forgot password? Click here to reset