Skip to main content

A Privacy Preserving Rental System

  • Conference paper
Information Security (ISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3650))

Included in the following conference series:

Abstract

Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concern, we present a privacy preserving rental system where interests of both the users and the service provider are protected. In particular, users are enabled to engage in a rental service in an anonymous manner; however, users who keep overdue rental items are subject to anonymity revocation. Moreover, to enforce rental limit we propose a new one-show anonymous credential scheme, tailored to the scenario of on-line credential issuing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255–270. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Brickell, E., Gemmel, P., Kravitz, D.: Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change. In: Proc. 6th Annual ACM-SIAMs, pp. 457–466 (1995)

    Google Scholar 

  3. Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme. In: Proc. Financial Cryptography, pp. 319–338 (2001)

    Google Scholar 

  4. Brands, S.: Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy, PhD Thesis (1999)

    Google Scholar 

  5. Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Proc. Advances in Cryptology, Eurocrypt 2001, LNCS, vol. 1880, pp. 93–118 (2001)

    Google Scholar 

  6. Camenisch, J., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Chaum, D.: Blind Signatures for Untraceable Payments. In: Proc. Advances in Cryptology, Crypto 1982, pp. 199–203 (1982)

    Google Scholar 

  8. Chaum, D.: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  9. Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)

    Google Scholar 

  10. Camenisch, J., Michels, M.: A Group Signature Scheme with Improved Efficiency. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 160–174. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Camenisch, J., Michels, M.: Proving in Zero-knowledge that A Number is the Product of Two Safe Primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107–122. Springer, Heidelberg (1999)

    Google Scholar 

  12. Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Sommer, G., Daniilidis, K., Pauli, J. (eds.) CAIP 1997. LNCS, vol. 1296, pp. 410–424. Springer, Heidelberg (1997)

    Google Scholar 

  13. Damagard, I., Fujisaki, E.: An Integer Commitment Scheme Based on Groups with Hidden Order. IACR Cryptology ePrint Archive 2001/064 (2001)

    Google Scholar 

  14. Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym Systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, p. 184. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  15. Shigetomi, R., Otsuka, A., Ogawa, T., Imai, H.: An Anonymous Loan System Based on Group Signature Scheme. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 244–256. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. Stadler, M., Piveteau, J.M., Camenisch, J.: Fair Blind Signatures. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 209–219. Springer, Heidelberg (1995)

    Google Scholar 

  17. Stubblebine, S.G., Syverson, P.F., Goldschlag, D.M.: Unlinkable Serial Transactions: Protocols and Applications. ACM Transactions on Information and System Security 2(4), 354–389 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, Y., Ooi, B.C. (2005). A Privacy Preserving Rental System. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds) Information Security. ISC 2005. Lecture Notes in Computer Science, vol 3650. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556992_5

Download citation

  • DOI: https://doi.org/10.1007/11556992_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29001-8

  • Online ISBN: 978-3-540-31930-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics