On blind signatures and perfect crimes
Computers and Security
Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Provably Secure Partially Blind Signatures
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
SIAM Journal on Computing
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Review: Situation identification techniques in pervasive computing: A review
Pervasive and Mobile Computing
Fair blind signatures without random oracles
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Fair partially blind signatures
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Efficient blind and partially blind signatures without random oracles
TCC'06 Proceedings of the Third conference on Theory of Cryptography
The quest for personal control over mobile location privacy
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
PRAM: privacy preserving access management scheme in cloud services
Proceedings of the 2013 international workshop on Security in cloud computing
Hi-index | 0.00 |
In pervasive computing environments, the users can get access to the services from the service providers in a highly desirable way. But the security of the user's authentication is a challenging field. Pervasive computing environments must provide the service to only legitimate users. On the other hand, some users attempt to keep their anonymity without revealing their identities while using some privacy-related services such as location information, printing, buying shares, etc. In this paper, we propose a conditional privacy-preserving authentication and access control scheme for pervasive computing environments, called CPriauac. Compared with the previous schemes in the literature, registration servers and authentication servers in the proposed scheme need not maintain any sensitive verification tables. The management of public keys is easier. Furthermore, the anonymity of the user can be removed efficiently once the dispute happens. The proposed scheme provides user anonymity against outside and inside parties, mutual authentication, accountability and differentiated access control.