Trusted Ticket Systems and Applications
نویسندگان
چکیده
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users’ privacy. We construct a ticket system, a concept at the heart of Identity Management, relying solely on the capabilities of the trusted platform module and the Trusted Computing Group’s standards. Two examples show how it can be used for pseudonymous, protected service access.
منابع مشابه
MIKEY-TICKET: Ticket-Based Modes of Key Distribution in Multimedia Internet KEYing (MIKEY)
The Multimedia Internet KEYing (MIKEY) specification describes a key management scheme for real-time applications. In this document, we note that the currently defined MIKEY modes are insufficient to address deployment scenarios built around a centralized key management service. Interest in such deployments is increasing. Therefore, a set of new MIKEY modes that work well in such scenarios are ...
متن کاملA Privacy-preserving Architecture for Ubiquitous Public Transport Systems based on E-ticketing
In this paper, we present a privacy-preserving architecture for a public transport system. The Transport Authority (TA) is prevented from learning e-ticket IDs and operates only on pseudonyms created by a trusted third party (TTP). Furthermore, the widely distributed terminals are prevented from tracking valid e-tickets during validation. Mutual authentication between terminals and e-tickets is...
متن کاملImplementation of a Trusted Ticket System
Trusted Computing is a security technology which enables the establishment of trust between multiple parties. Previous work showed that Trusted Computing technology can be used to build tickets, a core concept of Identity Management Systems. Relying solely on the Trusted Platform Module we will demonstrate how this technology can be used in the context of Kerberos for an implementation variant ...
متن کاملWeakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange
This paper presents applications for the weak protection of secrets in which weakness is not just acceptable but desirable. For one application, two versions of a lottery scheme are presented in which the result of the lottery is determined by the ticket numbers purchased, but no one can control the outcome or determine what it is until after the lottery closes. This is because the outcome is k...
متن کاملAn Improved Non-Iterative Privacy Preservation Lotteries
In 2009, a non-iterative privacy preservation for online lotteries is proposed in IET Information Security by J.S lee, C.S Chan and C.C Chang [1], who claim their scheme achieve the following properties: Privacy. No one can learn the choices made by lottery players except the players themselves. Security. No one can counterfeit a winner or forge a winning lottery ticket to claim the prize. ...
متن کامل