'A public key infrastructure model for privacy-enhancing general purpose eIDs'

被引:0
|
作者
Kefallinos, Dionysis [1 ]
Sykas, Efstathios [1 ]
机构
[1] Natl Tech Univ Athens, Sch Elect Engn & Comp Sci, GR-15773 Athens, Greece
关键词
public key cryptography; data privacy; public key infrastructure model; privacy enhancing general purpose eIDs; hybrid identity certificate; PKI model; electronic identities; personal information privacy; hinder user tracking; personal information privacy protection; PKI systems;
D O I
10.1049/iet-ifs.2013.0215
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, the authors propose a hybrid identity certificate - attribute certificate public key infrastructure (PKI) model with elements of anonymity, applicable to general purpose electronic identities, which aims to defend personal information privacy, hinder user tracking and preserve the free will of its users. The authors analyse the associated processes, the certificate contents and the roles of the parties involved. The authors' motive for its formulation is the belief that research previously done in this field is either too restrictive, too proprietary, too difficult to implement, or a combination of the above. In addition, the PKIs that have been deployed in most countries, both public and private, do not in the authors view protect personal information privacy. Instead, the authors propose a model that adheres to standards, is easy to implement, requires as little as possible application development for integration into commercial PKI systems, is suitable for large-scale deployment and concedes little in the protection of personal information privacy.
引用
收藏
页码:91 / 99
页数:9
相关论文
共 32 条
  • [1] Privacy-Enhancing Trust Infrastructure for Process Mining
    Wohlgemuth, Sven
    Takaragi, Kazuo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 149 - 156
  • [2] Scalable policy driven and general purpose public key infrastructure (PKI)
    Prasad, V
    Potakamuri, S
    Ahern, M
    Lerner, M
    Balabine, I
    Dutta, P
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 138 - 147
  • [3] On the Blockchain-based General-Purpose Public Key Infrastructure
    Osmov, Victor
    Kurbanniyazov, Atadjan
    Hussain, Rasheed
    Oracevic, Alma
    Kazmi, S. M. Ahsan
    Hussain, Fatima
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [4] A general certification framework with applications to privacy-enhancing certificate infrastructures
    Camenisch, Jan
    Sommer, Dieter
    Zimmermann, Roger
    [J]. SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 25 - +
  • [5] A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
    Sani, Abubakar Sadiq
    Yuan, Dong
    Yeoh, Phee Lep
    Bao, Wei
    Chen, Shiping
    Vucetic, Branka
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] A privacy-enhancing model for location-based personalized recommendations
    Jin Huang
    Jianzhong Qi
    Yabo Xu
    Jian Chen
    [J]. Distributed and Parallel Databases, 2015, 33 : 253 - 276
  • [7] A privacy-enhancing model for location-based personalized recommendations
    Huang, Jin
    Qi, Jianzhong
    Xu, Yabo
    Chen, Jian
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2015, 33 (02) : 253 - 276
  • [8] Privacy-enhancing authenticated key agreement protocols based on elliptic curve cryptosystem
    Cao, Tian-Jie
    Lei, Hong
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2008, 36 (02): : 397 - 401
  • [9] An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications
    Such, Jose M.
    Espinosa, Agustin
    Garcia-Fornes, Ana
    [J]. ADVANCED AGENT TECHNOLOGY, 2012, 7068 : 411 - 425
  • [10] A privacy-enhancing e-business model based on infomediaries
    Gritzalis, D
    Moulinos, K
    Kostis, K
    [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 72 - 83