Interpolation of the Double Discrete Logarithm
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
On the Portability of Generalized Schnorr Proofs
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
A requirements-driven trust framework for secure interoperation in open environments
iTrust'06 Proceedings of the 4th international conference on Trust Management
TATA: towards anonymous trusted authentication
iTrust'06 Proceedings of the 4th international conference on Trust Management
A framework for practical universally composable zero-knowledge protocols
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
An integrated approach for trust management based on policy, community adherence and reputation
International Journal of Ad Hoc and Ubiquitous Computing
International Journal of Advanced Pervasive and Ubiquitous Computing
Hi-index | 0.00 |
There is generally no a priori trust relationship amongentities interacting in pervasive computing environmentswhich makes it necessary to establish trust from scratch.This task becomes extremely challenging when it is simultaneouslynecessary to protect the privacy of the actors involved.This paper shows how trust can be based on previousinteractions yet remain unlinkable to any previous eventor any specific entity. A solution based on group blind signaturesis proposed that relies on credentials both secret,meaning that they contain an encrypted description of previousinteractions, and untraceable, meaning that they cannotbe recognized when presented to their issuer.