Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI

  • Konstantin Hyppönen
  • Marko Hassinen
  • Elena Trichina
Conference paper

DOI: 10.1007/978-3-540-68979-9_8

Volume 4968 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Hyppönen K., Hassinen M., Trichina E. (2008) Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI. In: Lipp P., Sadeghi AR., Koch KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg

Abstract

An electronic ID scheme must be usable in a wide range of circumstances, especially in ordinary situations, such as proving your right to a concession ticket on a bus. One of the problems to be addressed is privacy. Indeed, when documents are read by electronic means, a lot of information is not only revealed, but can be copied, stored and processed without our consent. Another issue is ubiquity, reliability and acceptance of the involved technology. In this paper we attempt to address these issues by combining an officially recognised national mobile e-ID infrastructure with identification procedures based on controlled identity revelation. We report a prototype implementation of an identity tool on a mobile phone with a PKI-SIM card.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Konstantin Hyppönen
    • 1
  • Marko Hassinen
    • 1
  • Elena Trichina
    • 2
  1. 1.Department of Computer ScienceUniversity of KuopioKuopioFinland
  2. 2.Spansion International Inc.MunichGermany