Multiple identity fraud is one way of abusing evidence with zero disclosure to identify a participant.
Content
- 1 Description
- 2 Ways to Prevent
- 3 Note
- 4 See also
- 5 Literature
Description
Zero-disclosure evidence suggests that the prover holds some secret that identifies her identity. The prover receives the secret from a trusted center. Suppose that when a secret is issued, the individual’s appearance is not verified, or it is not unique, or cannot be verified properly. Then this party can generate several secrets, write them to the open file of the trusted center, and therefore it will have “several personalities”. Such an opportunity allows, for example, to commit a crime and hide with impunity. Let the party create several personalities, one of which it never uses. Then, during the commission of the crime, the party identifies himself as this never-used person. After the crime, the identity is never used again. Thus, it is almost impossible to track down a criminal [1] .
Prevention Methods
The simplest way to prevent cheating with multiple individuals is that the prover cannot have more than one person. One option is to prevent theft of children protected from cloning and who have a unique identifier derived from part of their genetic code. Also, each child can receive an identity from a parent only at birth. However, at this point, the parent can create several personalities for the child (for example, obtaining more than two birth certificates). Therefore, in this case, the creation of a unique personality is based on trust [2] .
Note
- ↑ Schneier, 2002 , p. 93.
- ↑ Desmedt, Goutier, Bengio, 1988 , p. 25.
See also
- Grandmaster's Problem
- Mafia deception
Literature
- Desmedt Y. G. , Goutier C. , Bengio S. Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract) // Advances in Cryptology - CRYPTO '87 : A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California , USA, August 16-20, 1987, Proceedings / C. Pomerance - Berlin : Springer Berlin Heidelberg , 1988. - P. 21–39. - ( Lecture Notes in Computer Science ; Vol. 293) - ISBN 978-3-540-18796-7 - ISSN 0302-9743 - doi: 10.1007 / 3-540-48184-2_3
- Schneier B. Applied Cryptography. Protocols, algorithms, C source code = Applied Cryptography. Protocols, Algorithms and Source Code in C. - M .: Triumph, 2002 .-- 816 p. - 3000 copies. - ISBN 5-89392-055-4 .
- Bengio S. , Brassard G. , Desmedt Y. G. et al. Secure implementation of identification systems // Journal of Cryptology / I. Damgård - Springer Science + Business Media , International Association for Cryptologic Research , 1991. - Vol. 4, Iss. 3. - P. 175–183. - ISSN 0933-2790 - doi: 10.1007 / BF00196726
- Journal of Experimental and Theoretical Artificial Intelligence - Taylor & Francis , 1989 .-- ISSN 0952-813X ; 1362-3079