Pseudonymous PKI for ubiquitous computing

36Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Conventional PKI is the most effective and efficient solution to non-repudiation. But, it also puts user privacy in danger because the user's activities could be tracked via the unique public-key and certificate he presents in multiple transactions. Pseudonymous PKI (PPKI) solution achieves non-repudiation as well as privacy protection at the same time by providing Pseudonymous Public-Key (PPK) and Pseudonymous Certificate (PCert) that are computed by the user without CA intervention. PPK is as effective as conventional public-key in terms of non-repudiation. Furthermore, the PPKI solution is very efficient in terms of the size of PPK and PCert, and is scalable in terms of certification authority overhead. Therefore PPKI is particularly suitable for ubiquitous computing environments where authenticity, non-repudiation, privacy protection, efficiency, and scalability are key requirements. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Zeng, K. (2006). Pseudonymous PKI for ubiquitous computing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4043 LNCS, pp. 207–222). Springer Verlag. https://doi.org/10.1007/11774716_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free