Javascript must be enabled to continue!
Integrity of Anonymous Data
View through CrossRef
This chapter discusses schemes to confirm that data owned by anonymous entities are legitimate ones, in other words, to protect data owned by anonymous entities from their illegitimate modifications, forgeries, additions, and deletions. Blind Signature schemes enable entity P to obtain the signature of other entity on its data M without disclosing M, therefore later on P can prove the authenticity of M without disclosing its identity. Unlinkable signatures on data ensure that signers had honestly signed on only and all eligible data while disabling anyone including data owners and signers to know correspondences between the data and their signed forms, and implicit transaction links (ITLs) can be used to force entities not to delete their maintaining data without knowing the data themselves. These schemes enable developments of homomorphic anonymous tokens and anonymous credentials, where entities can prove their eligibilities while maintaining their anonymities by showing tokens or credentials. They also enable the identifications of dishonest entities, while preserving privacies of honest entities.
Title: Integrity of Anonymous Data
Description:
This chapter discusses schemes to confirm that data owned by anonymous entities are legitimate ones, in other words, to protect data owned by anonymous entities from their illegitimate modifications, forgeries, additions, and deletions.
Blind Signature schemes enable entity P to obtain the signature of other entity on its data M without disclosing M, therefore later on P can prove the authenticity of M without disclosing its identity.
Unlinkable signatures on data ensure that signers had honestly signed on only and all eligible data while disabling anyone including data owners and signers to know correspondences between the data and their signed forms, and implicit transaction links (ITLs) can be used to force entities not to delete their maintaining data without knowing the data themselves.
These schemes enable developments of homomorphic anonymous tokens and anonymous credentials, where entities can prove their eligibilities while maintaining their anonymities by showing tokens or credentials.
They also enable the identifications of dishonest entities, while preserving privacies of honest entities.
Related Results
Developing guidelines for research institutions
Developing guidelines for research institutions
As introduced in Chapter 1, in this thesis, I developed guidelines to research institutions on how to foster research integrity. I did this by exploring how research institutions c...
Well Integrity Data Assessment WIDA Implementation through Integrating Established Well Data Systems to Increase Safe Operability for Wells with a History of Interdependence Integrity Issues
Well Integrity Data Assessment WIDA Implementation through Integrating Established Well Data Systems to Increase Safe Operability for Wells with a History of Interdependence Integrity Issues
Abstract
ADCO is accountable to operate a well stock with integrity, technical and operational challenges. It is the responsibility of ADCO to devise a system or met...
Actualització consistent de bases de dades deductives
Actualització consistent de bases de dades deductives
En aquesta tesi, proposem un nou mètode per a l'actualització consistent de bases de dades deductives. Donada una petició d'actualització, aquest mètode tradueix de forma automàtic...
Risk-Based Analysis of Thermal Well Integrity Through Integration of Caprock Geomechanics and Cement Sheath Design
Risk-Based Analysis of Thermal Well Integrity Through Integration of Caprock Geomechanics and Cement Sheath Design
Abstract
The integrity of thermal in situ wells is a function of the distinct yet inter-related processes that control the integrity of the reservoir caprock and of ...
Fissure Integrity and Volume Reduction in Emphysema: A Retrospective Study
Fissure Integrity and Volume Reduction in Emphysema: A Retrospective Study
<b><i>Background:</i></b> One-way endobronchial valves (EBVs) relieve symptoms of emphysema, particularly in patients without collateral ventilation between...
Academic and clinical integrity: undergraduate nursing students’ perceptions
Academic and clinical integrity: undergraduate nursing students’ perceptions
Abstract
Background
Despite education on academic integrity, there are still instances where nursing students breach academic integrity principle...
Research Integrity - where are we?
Research Integrity - where are we?
What is Ethics? The definition of ethics revolves around the concept of morality. Ethics is defined as a set of moral principles that govern a person's actions. Or as the philosoph...
Riser Integrity Management-Recent Advances in the Deepwater Industry Practice
Riser Integrity Management-Recent Advances in the Deepwater Industry Practice
Abstract
Riser Integrity Management (RIM) could be defined as a continuous process of ‘knowledge and experience management’ applied throughout the lifecycle of th...

