{"title":"Anonymity and security in public Internet forums","authors":"Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung","doi":"10.1109/ICECT.2005.22","DOIUrl":null,"url":null,"abstract":"In this paper, we first introduce the privacy and security requirements in public forums, which include anonymity, traceability, impossibility of impersonation, unforgeability, verifiability, fairness, easy anonymity revocation, and un-involvement of authorities. We then propose an anonymous and secure forum protocol based on a concept of alias certificate with detailed analysis to show that our scheme satisfies all these requirements. In particular, participants only need to register once with the authorities and the authorities are not involved during message postings, yet the anonymity of participants and the traceability of malicious information can be achieved. This can greatly increase the usability and efficiency as participants often post messages frequently.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECT.2005.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, we first introduce the privacy and security requirements in public forums, which include anonymity, traceability, impossibility of impersonation, unforgeability, verifiability, fairness, easy anonymity revocation, and un-involvement of authorities. We then propose an anonymous and secure forum protocol based on a concept of alias certificate with detailed analysis to show that our scheme satisfies all these requirements. In particular, participants only need to register once with the authorities and the authorities are not involved during message postings, yet the anonymity of participants and the traceability of malicious information can be achieved. This can greatly increase the usability and efficiency as participants often post messages frequently.