Establishing Trust with Privacy
In pervasive computing environments, a priori trust among parties is lacking. New mechanisms are required in order to build trust without relying on existing relationships. We present a solution to establish trust based on a history of previous interactions among parties. Past interactions can be proven while assuring the untraceability and anonymity of provers.
KeywordsSignature Scheme Trust Establishment Discrete Logarithm Problem Brute Force Attack Pervasive Computing Environment
Unable to display preview. Download preview PDF.
- 2.Brands, S.: A technical overview of digital credentials. Technical report, Credentica (2002)Google Scholar
- 5.Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (February 1981)Google Scholar
- 6.Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Rfc 2693 – spki certificate theory (1999)Google Scholar
- 7.Ramzan, Z.A.: Group blind digital signatures: Theory and applications (1999)Google Scholar