Establishing Trust with Privacy
نویسندگان
چکیده
With the advent of self-organizing systems such as ad hoc networks or ubiquitous computing, security protocols have to meet a new requirement for establishing trust among parties that have no a priori relationship like a shared naming structure or a common organization. Trust establishment in this context calls for a brand new paradigm with respect to classical scenarios whereby entities build trust based on some existing security association. We suggest in this paper a cryptographic protocol through which parties can build trust based on the history of their interactions with other parties. This protocol allows a prover to get a proof of history or the evidence that it was involved in some interaction with another party. During further interactions, other parties consider the prover trustworthy based on the verification of the proof of history. Privacy is an essential requirement for such a protocol since providing proof of history to several parties without privacy would severely expose the behavior of the prover. The history-based trust establishment protocol thus assures the anonymity of the prover and the unlinkability of interactions using the proof of history. Moreover, the prover can choose to show only parts of its history. The proof of history is based on a signature mechanism and the trust establishment protocol is a challenge-response protocol based on this mechanism. The signature mechanism is an extension of group signatures.
منابع مشابه
Research on the Relationship between Trust and Privacy in Network Environments
In network environments, the entities that connect to or interact with each other may know very little about each other or without prior knowledge at the beginning of an interaction. Therefore, in many cases, before a serious interaction begins, trust must be established between the interactive entities. During trust establishment, an entity may require that the other entity provide some inform...
متن کاملOrdered Semiring-based Trust Establish Model with Risk Protecting
Trust management systems support the provision of the required levels of assurance in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for establishing and verifying trust. Furthermore, t...
متن کاملThe Relationship Between Patients’ Perceived Health Status and Trust Propensity With Privacy Calculus
Background: Patients need peace of mind to disclose their information to medical staff and with the lack of trust or in specific health status, they may avoid providing sensitive information for their care or might change the information. This research aims to examine the impact of perceived health status and trust propensity on privacy calculus. Methods: This research was analytical-study. 3 ...
متن کاملOrdered Semiring-based Trust Establish Model with Risk Evaluating
Distributed trust management supports the provision of the required levels in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for establishing and verifying trust metric where it may dis...
متن کاملThe role of inter-channel trust transfer in establishing mobile commerce trust
Mobile brokerage services represent an emerging application of mobile commerce in the brokerage industry. Compared with telephone-based trading services and online brokerage services, they have advantages such as ubiquity, convenience, and privacy. However, the number of investors using mobile brokerage services to conduct brokerage transactions is far smaller than those using other trading met...
متن کامل