Sciweavers

HUC
2007
Springer

Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

14 years 6 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity authentication may not be sufficient or even appropriate, especially if a principal’s privacy is to be protected. In order to preserve privacy, other attributes (e.g. location or trustworthiness) of the principal may need to be authenticated to a verifier. In this paper we propose Ninja: a non-identity-based authentication scheme for a mobile ubiquitous environment, in which the trustworthiness of a user’s device is authenticated anonymously to a remote Service Provider (verifier), during the service discovery process. We show how this can be achieved using Trusted Computing functionality.
Adrian Leung, Chris J. Mitchell
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where HUC
Authors Adrian Leung, Chris J. Mitchell
Comments (0)