Skip to main content

Privacy Enhanced Technologies: Methods – Markets – Misuse

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3592))

Abstract

Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the utilisation of such technologies. The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it profitable. The governments or non-profit organisations must therefore run such systems or at least promote their further development and deployment. Especially governments have however conflicting interests: While governments of democratic nations are responsible to keep the freedom of citizens (and privacy as a part of it), governments also need instruments to prosecute criminal activities. Subsequently, Privacy Enhancing Technologies have to consider law enforcement functionality in order to balance these different targets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, pseudonymity, and identity management – A proposal for terminology (2000-2004), http://dud.inf.tu-dresden.de/Literatur_V1.shtml

  2. Hes, R., Borking, J.J. (eds.): Privacy Enhancing Technologies: The path to anonymity. revised edition, A&V 10, The Hague (1998)

    Google Scholar 

  3. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. CACM 21, 120–126 (1978) reprinted: 96-99, (January 26, 1983)

    MATH  MathSciNet  Google Scholar 

  4. Chaum, D.: Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. Communications of the ACM 24, 84–88 (1981)

    Article  Google Scholar 

  5. Chaum, D.: Blind Signatures for Untraceable Payments. In: Rivest, R.L., Sherman, A., Chaum, D. (eds.) Advances in Cryptology 1981 - 1997, pp. 199–203. Plenum Press, New York (1983)

    Google Scholar 

  6. Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28 (1985)

    Google Scholar 

  7. Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology 1, 65–75 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  8. Bürk, H., Pfitzmann, A.: Value exchange systems enabling security and unobservability. Computers & Security 9, 715–721 (1990)

    Article  Google Scholar 

  9. Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead. In: Proc. Kommunikation in verteilten Systemen (KiVS), pp. 451–463. Springer, Berlin (1991); IFB 267

    Google Scholar 

  10. Cooper, D.A., Birman, K.P.: Preserving privacy in a network of mobile computers. In: 1995 IEEE Symposium on Research in Security and Privacy, pp. 26–38. IEEE Computer Society Press, Los Alamitos (1995), http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR85-1490

    Google Scholar 

  11. Cottrell, L.: Mixmaster & Remailer Attacks (1995), http://www.obscura.com/~loki/remailer-essay.html

  12. Federrath, H., Jerichow, A., Pfitzmann, A.: Mixes in Mobile Communication Systems: Location Management with Privacy. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 121–135. Springer, Heidelberg (1996)

    Google Scholar 

  13. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Google Scholar 

  14. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. DIMACS Technical Report 97 (1997)

    Google Scholar 

  15. Kesdogan, D., Egner, J., Büschkes, R.: Stop-and-go-mIXes providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 83–98. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Berthold, O., Federrath, H., Köhntopp, M.: Project Anonymity and Unobservability in the Internet. In: Proc. Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy 2000, Toronto/Canada, April 4–7. Association for Computing Machinery, pp. 57–65. ACM, New York (2000) ISBN 1-58113-256-5

    Google Scholar 

  17. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)

    Google Scholar 

  18. Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  19. The Free Haven Project: Anonymity bibliography (2005), http://www.freehaven.net/anonbib/

  20. JAP: The JAP Anonymity & Privacy Homepage (2000-2005), http://www.anon-online.de

  21. TOR: An anonymous Internet communication system (2004), http://tor.eff.org/

  22. Golembiewski, C., Hansen, M., Steinbrecher, S.: Experiences running a web anonymising service. In: Proc. 14th Intl. Workshop on Database and Expert Systems Applications (DEXA 2003), Prague, Czech Republic, pp. 482–486. IEEE Computer Society, Los Alamitos (2003)

    Chapter  Google Scholar 

  23. Spiekermann, S.: Die Konsumenten der Anonymität – Wer nutzt Anonymisierungsdienste? Datenschutz und Datensicherheit DuD 27, 150–154 (2003)

    Google Scholar 

  24. Spiekermann, S.: The desire for privacy: Insights into the views and nature of the early adopters of privacy services. International Journal of Technology and Human Interaction 1 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Federrath, H. (2005). Privacy Enhanced Technologies: Methods – Markets – Misuse. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_1

Download citation

  • DOI: https://doi.org/10.1007/11537878_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28224-2

  • Online ISBN: 978-3-540-31796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics