Repository logo
 

Am I in good company? A privacy-protecting protocol for cooperating ubiquitous computing devices

Accepted version
Peer-reviewed

Loading...
Thumbnail Image

Change log

Abstract

A portable device carries important secrets in encrypted form; to unlock it, a threshold secret sharing scheme is used, requiring the presence of several other devices. We explore the design space for the protocol through which these devices communicate wirelessly, under the additional constraint that eavesdroppers should not be able to recognize and track the user carrying these devices.

Description

Keywords

Journal Title

Security Protocols 2012: Security Protocols XX

Conference Name

Security Protocols Workshop 2012

Journal ISSN

Volume Title

Publisher

Springer Nature

Rights and licensing

Except where otherwised noted, this item's license is described as http://www.rioxx.net/licenses/all-rights-reserved