2010
DOI: 10.1007/978-3-642-16793-5_10
|View full text |Cite
|
Sign up to set email alerts
|

Multilaterally Secure Ubiquitous Auditing

Abstract: Tracking information of individuals is a useful input to many Ubiquitous Computing (UbiComp) applications. Consider the example of a smart emergency management application: once mobile first responders are continuously tracked, a precise and safe coordination of rescue missions is possible, and also mission logs can be created for audit purposes. However, continuously tracking users and storing the data for later use is often in conflict with individual privacy preferences. This may ultimately lead to the non-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 51 publications
0
7
0
Order By: Relevance
“…This scenario has the same weakness as the other pseudonymisers, since it may be vulnerable to trac analysis attacks in the intervals between rekeying of the pseudonymiser. Some of the ideas in this scheme have been extended to support multilaterally secure ubiquitous auditing in [27,26]. It combines transaction pseudonyms based on threshold cryptography with secure multiparty computations to support secure and privacy enhanced tracking of mobile rescue units.…”
Section: Related Workmentioning
confidence: 99%
“…This scenario has the same weakness as the other pseudonymisers, since it may be vulnerable to trac analysis attacks in the intervals between rekeying of the pseudonymiser. Some of the ideas in this scheme have been extended to support multilaterally secure ubiquitous auditing in [27,26]. It combines transaction pseudonyms based on threshold cryptography with secure multiparty computations to support secure and privacy enhanced tracking of mobile rescue units.…”
Section: Related Workmentioning
confidence: 99%
“…A traceable signature scheme 26) , which is a group signature scheme with additional tracing capabilities 3) , can be used as a cryptographic primitive to set up privacy-friendly X.509 attribute certificates that can provide unlinkability between different appearances of the same attribute certificate 5) . Semantically secure encryption can be used to generate changeable pseudonyms 43) . Changeable transaction pseudonyms, which are represented by ciphertexts, were presented in 42).…”
Section: Other Pseudonym Constructionsmentioning
confidence: 99%
“…Also, we assume that potential receivers of messages continuously provide location information to the system. In order to deal with the inherent privacy issues [20,21] of this situation, we propose that location tracking proceeds under transaction pseudonyms. Yet, we also provide a technique for reidentification of role or specialization attributes implicitly attached to pseudonyms.…”
Section: Sketch Of Approachmentioning
confidence: 99%
“…First, in order to generate transaction pseudonyms, a base pseudonym PU i ,B of a user Ui is initially created as an ElGamal encryption of an algebraic representation of the unique base identifier IDi (cp. [20,21]). Thus, ID ∈ Gq is non-deterministically encrypted by choosing r ∈R Zq and by computing (g r , h r IDi).…”
Section: Technique For Re-identificationmentioning
confidence: 99%
See 1 more Smart Citation