The secure protocol of reversed user identification

Kusper Gábor <>
Eszterházy Károly Főiskola

Biró Csaba <>
Eszterházy Károly Főiskola

Tajti Tibor <>
Eszterházy Károly Főiskola

 


We understand under the reversed user identification the following method: the source of (either a person or an organization) a request does not public his or her or its name or identification number, but the data of the request can be accessed. Based on this data one can send offer for the request, without knowing the requester. This is the reverse of the usual anonym tenders, where the requestor (or announcer) is known, but the offers are anonym. We are interested in reversed user identification, because we develop a system, where the users can record data about their way of life (eating, physical activities, environmental impacts). These data can be accessed by way of life mentors, but it must be a guarantee, that the mentors cannot find out to whom belong the data. If a mentor see that someone has a dangerous way of life (because the owner of the data has overweight and moves to little), then he or she can send to him or her a message. The mentors have to identify themselves in the message.

The system uses the following solutions:

Keywords:  reversed user identification, secure protocol