{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:45Z","timestamp":1754157225683,"version":"3.41.2"},"reference-count":14,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2006,3,1]],"date-time":"2006-03-01T00:00:00Z","timestamp":1141171200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,3,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The \u201ctraceable signature\u201d scheme was used in conjunction with the \u201cprivilege management infrastructure\u201d.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The cryptographic primitive provides a suitable tool for anonymous and unlinkable access to web resources based on the privileges that users hold. Moreover, the scheme allows for anonymity revocation and tracing of unlinkable accesses.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The power of the attribute authority should be divided into several entities, one of them being a trusted third party, to avoid illicit disclosing of information.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>New systems with support for anonymous access to web resources can be developed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper adds the unlinkability property to anonymous accesses together with a tracing facility to existing proposals.<\/jats:p><\/jats:sec>","DOI":"10.1108\/10662240610656474","type":"journal-article","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T00:18:53Z","timestamp":1151972333000},"page":"120-139","source":"Crossref","is-referenced-by-count":7,"title":["Anonymous attribute certificates based on traceable signatures"],"prefix":"10.1108","volume":"16","author":[{"given":"Vicente","family":"Benjumea","sequence":"first","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Troya","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022030820241967000_b1","doi-asserted-by":"crossref","unstructured":"Ateniense, G., Camenish, J., Joye, M. and Tsudik, G. (2000), \u201cA practical and provably secure coalition\u2010resistant group signature scheme\u201d, CRYPTO 2000: Advances in Cryptology, Springer\u2010Verlag, New York, NY, pp. 255\u201070 (Vol. 1880 of Lecture Notes in Computer Science).","DOI":"10.1007\/3-540-44598-6_16"},{"key":"key2022030820241967000_b2","doi-asserted-by":"crossref","unstructured":"Benjumea, V., L\u00f6pez, J., Montenegro, J.A. and Troya, J.M. (2004), \u201cA first approach to provide anonymity in attribute certificates\u201d, in Bao, F., Deng, R.H. and Zhou, J. (Eds), PKC 2004, International Workshop on Practice and Theory in Public Key Cryptography, Springer\u2010Verlag, New York, NY, pp. 402\u201015 (Vol. 2947 of Lecture Notes in Computer Science).","DOI":"10.1007\/978-3-540-24632-9_29"},{"key":"key2022030820241967000_b3","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1983), \u201cBlind signatures for untraceable payments\u201d, in Chaum, D., Rivest, R. and Sherman, A. (Eds), Advances in Cryptology\u2013Crypto'82, Plenum Press, Santa Barbara, CA, pp. 199\u2010203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"key2022030820241967000_b4","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1985), \u201cSecurity without identification: transaction systems to make big brother obsolete\u201d, Communications of the ACM, Vol. 28 No. 10, pp. 1030\u201044.","DOI":"10.1145\/4372.4373"},{"key":"key2022030820241967000_b5","doi-asserted-by":"crossref","unstructured":"Chaum, D. and van Heyst, E. (1991), \u201cGroup signatures\u201d, in Davies, D.W. (Ed.), Advances in Cryptology \u2013 EuroCrypt '91, Springer\u2010Verlag, Berlin, pp. 257\u201065 (Volume 547 of Lecture Notes in Computer Science).","DOI":"10.1007\/3-540-46416-6_22"},{"key":"key2022030820241967000_b6","unstructured":"ITU\u2010T Recommendation X.509 (1997), Information Technology \u2013 Open systems Interconnection \u2013 The Directory: Authentication Framework, International Telecommunication Union, Geneva."},{"key":"key2022030820241967000_b7","unstructured":"ITU\u2010T Recommendation X.509 (2000), Information Technology \u2013 Open Systems Interconnection \u2013 The Directory: Public\u2010Key and Attribute Certificate Frameworks, International Telecommunication Union, Geneva."},{"key":"key2022030820241967000_b8","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Tsiounis, Y. and Yung, M. (2004a), \u201cTraceable signatures\u201d, EUROCRYPT 2004: Advances in Cryptology, Springer\u2010Verlag, New York, NY, pp. 571\u201089 (Vol. 3027 of Lecture Notes in Computer Science).","DOI":"10.1007\/978-3-540-24676-3_34"},{"key":"key2022030820241967000_b10","doi-asserted-by":"crossref","unstructured":"Kilian, J. and Petrank, E. (1998), \u201cIdentity escrow\u201d, CRYPTO 1998: Advances in Cryptology, Springer\u2010Verlag, New York, NY, pp. 169\u201085 (Vol. 1462 of Lecture Notes in Computer Science).","DOI":"10.1007\/BFb0055727"},{"key":"key2022030820241967000_b11","doi-asserted-by":"crossref","unstructured":"Nguyen, L. and Safavi\u2010Naini, R. (2004), \u201cEfficient and provably secure trapdoor\u2010free group signature schemes from bilinear pairings\u201d, ASIACRYPT 2004: Advances in Cryptology, Springer\u2010Verlag, New York, NY, pp. 372\u201086 (Vol. 3329 of Lecture Notes in Computer Science).","DOI":"10.1007\/978-3-540-30539-2_26"},{"key":"key2022030820241967000_b12","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A. and Tauman, Y. (2001), \u201cHow to leak a secret\u201d, ASIACRYPT 2001: Advances in Cryptology, Springer\u2010Verlag, New York, NY, pp. 552\u201065 (Vol. 2248 of Lecture Notes in Computer Science).","DOI":"10.1007\/3-540-45682-1_32"},{"key":"key2022030820241967000_b13","doi-asserted-by":"crossref","unstructured":"Stadler, M.A., Piveteau, J.M. and Camenisch, J.L. (1995), \u201cFair blind signatures\u201d, in Guillou, L.C. and Quisquater, J.J. (Eds), Advances in Cryptology\u2013Eurocrypt'95, Springer\u2010Verlag, New York, NY, pp. 209\u201019 (Vol. 921 of Lecture Notes in Computer Science).","DOI":"10.1007\/3-540-49264-X_17"},{"key":"key2022030820241967000_b14","doi-asserted-by":"crossref","unstructured":"von Solms, S. and Naccache, D. (1992), \u201cOn blind signatures and perfect crimes\u201d, Computers & Security, Vol. 11, pp. 581\u20103.","DOI":"10.1016\/0167-4048(92)90193-U"},{"key":"key2022030820241967000_frg1","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Tsiounis, Y. and Yung, M. (2004b), Traceable Signatures, IACR E\u2010Print Cryptology Archive, Report 2004\/007, available at: http:\/\/eprint.iacr.org\/.","DOI":"10.1007\/978-3-540-24676-3_34"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240610656474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240610656474\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240610656474\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:07Z","timestamp":1753400407000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/16\/2\/120-139\/181241"}},"subtitle":[],"editor":[{"given":"Stefanos","family":"Gritzalis","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2006,3,1]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,3,1]]}},"alternative-id":["10.1108\/10662240610656474"],"URL":"https:\/\/doi.org\/10.1108\/10662240610656474","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2006,3,1]]}}}