VeryIDX - A digital identity management system for pervasive computing environments

Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Squicciarini, Jungha Woo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

The problem of identity theft, that is, the act of impersonating others' identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper we address such problem by proposing an approach to manage user identity attributes by assuring their privacy-preserving usage. The approach is based on the concept of privacy preserving multi-factor authentication achieved by a new cryptographic primitive which uses aggregate signatures on commitments that are then used for aggregate zero-knowledge proof of knowledge (ZKPK) protocols. We present the implementation of such approach on Nokia NFC cellular phones and report performance evaluation results.

Original languageEnglish (US)
Title of host publicationSoftware Technologies for Embedded and Ubiquitous Systems - 6th IFIP WG 10.2 International Workshop, SEUS 2008, Proceedings
Pages268-279
Number of pages12
DOIs
StatePublished - 2008
Event6th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems, SEUS 2008 - Anacarpi, Capri Island, Italy
Duration: Oct 1 2008Oct 3 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5287 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems, SEUS 2008
Country/TerritoryItaly
CityAnacarpi, Capri Island
Period10/1/0810/3/08

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'VeryIDX - A digital identity management system for pervasive computing environments'. Together they form a unique fingerprint.

Cite this