Conventional PKI is the most effective and efficient solution to non-repudiation. But, it also puts user privacy in danger because the user's activities could be tracked via the unique public-key and certificate he presents in multiple transactions. Pseudonymous PKI (PPKI) solution achieves non-repudiation as well as privacy protection at the same time by providing Pseudonymous Public-Key (PPK) and Pseudonymous Certificate (PCert) that are computed by the user without CA intervention. PPK is as effective as conventional public-key in terms of non-repudiation. Furthermore, the PPKI solution is very efficient in terms of the size of PPK and PCert, and is scalable in terms of certification authority overhead. Therefore PPKI is particularly suitable for ubiquitous computing environments where authenticity, non-repudiation, privacy protection, efficiency, and scalability are key requirements. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Zeng, K. (2006). Pseudonymous PKI for ubiquitous computing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4043 LNCS, pp. 207–222). Springer Verlag. https://doi.org/10.1007/11774716_17
Mendeley helps you to discover research relevant for your work.