Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Developing a context-aware electronic tourist guide: some issues and experiences
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Towards context-aware adaptable web services
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Simple identity-based cryptography with mediated RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Secure pseudonym management using mediated identity-based encryption
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Enhancing the Privacy of e-Learning Systems with Alias and Anonymity
Computer Supported Cooperative Work in Design IV
Decentralized generation of multiple, uncorrelatable pseudonyms without trusted third parties
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Hi-index | 0.01 |
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to restore users' confidence in what could become the "killer app" of 3G networks. In this paper, we present a proxy-based public key infrastructure that allows LBS mobile users to shield their identities using pseudonyms and protect their communications using mediated identity-based encryption. In particular, we propose the first identity-based signature scheme applicable in a mediated environment. Furthermore, we introduce a process whereby a mobile user is only required to own one private key in order to protect her communications when accessing LBS under different pseudonyms. The identity-based character of the PKI simplifies significantly key management by removing the need for digital certificates. Its mediated architecture makes key revocation easier and more efficient as it allows for instant revocation of security capabilities.