Ninja: non identity based, privacy preserving authentication for ubiquitous environments

作者: Chris J. Mitchell , Adrian Leung

DOI: 10.5555/1771592.1771597

关键词: Challenge-Handshake Authentication ProtocolUbiquitous computingService providerPrincipal (computer security)Trusted ComputingService discoveryComputer securityComputer scienceIdentity (object-oriented programming)Authentication

摘要: Most of today's authentication schemes involve verifying the identity a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile nature, may not be sufficient or even appropriate, especially if principal's privacy to protected. order preserve privacy, other attributes (e.g. location trustworthiness) need authenticated verifier. this paper we propose Ninja: non-identity-based scheme for environment, trustworthiness user's device anonymously remote Service Provider (verifier), during service discovery process. We show how can achieved using Trusted Computing functionality.

参考文章(33)
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Isamu Teranishi, Jun Furukawa, Kazue Sako, k-Times Anonymous Authentication (Extended Abstract) international conference on the theory and application of cryptology and information security. pp. 308- 322 ,(2004) , 10.1007/978-3-540-30539-2_22
Carsten Rudolph, Covert Identity Information in Direct Anonymous Attestation (DAA) information security conference. pp. 443- 448 ,(2007) , 10.1007/978-0-387-72367-9_38
Frank Stajano, Security in Pervasive Computing SPC. pp. 6- 8 ,(2004) , 10.1007/978-3-540-39881-3_3
Feng Bao, Robert Deng, None, Privacy Protection for Transactions of Digital Goods international conference on information and communication security. ,vol. 2229, pp. 202- 213 ,(2001) , 10.1007/3-540-45600-7_23
J. Veizades, E. Guttman, C. Perkins, M. Day, Service Location Protocol, Version 2 Service Location Protocol, Version 2. ,vol. 2608, pp. 1- 54 ,(1999)
J. Veizades, E. Guttman, C. Perkins, S. Kaplan, Service Location Protocol RFC. ,vol. 2165, pp. 1- 72 ,(1997)
Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin, Authentication for Pervasive Computing Lecture Notes in Computer Science. pp. 116- 129 ,(2004) , 10.1007/978-3-540-39881-3_12
Shafi Goldwasser, Silvio Micali, Charles Rackoff, The knowledge complexity of interactive proof systems SIAM Journal on Computing. ,vol. 18, pp. 186- 208 ,(1989) , 10.1137/0218012
Mark Needleman, The Internet Engineering Task Force Serials Review. ,vol. 26, pp. 69- 72 ,(2000) , 10.1016/S0098-7913(99)00073-8