2005
DOI: 10.1007/11426646_27
|View full text |Cite
|
Sign up to set email alerts
|

Share the Secret: Enabling Location Privacy in Ubiquitous Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…OP has an important role similar to a trusted authority of PKI. The similar model is introduced in [12] that multiple OPs only share the secret and U directly communicates with S P. Our protocol deploys two different types of location sensing technologies, while we do not define specific location sensing methods. We show the improved location authentication and privacy protocol in following section.…”
Section: Improved Location Authentication and Privacy Protocolmentioning
confidence: 99%
“…OP has an important role similar to a trusted authority of PKI. The similar model is introduced in [12] that multiple OPs only share the secret and U directly communicates with S P. Our protocol deploys two different types of location sensing technologies, while we do not define specific location sensing methods. We show the improved location authentication and privacy protocol in following section.…”
Section: Improved Location Authentication and Privacy Protocolmentioning
confidence: 99%
“…Notably, Heinemann [28] proposes to implement privacy-respecting opportunistic networks based on changing pseudonyms, whereby he proclaims that identifiers must be changeable within every communication layer. A different use of pseudonyms is presented by Delakouridis et al [14], applying pseudonyms to the problem of storing and accessing location information in a privacy-preserving, decentralized manner. While our work shares the idea of using pseudonyms as reference points for data access, they propose to split the information to be protected according to Shamir secret sharing [47], and to distribute those shares on several servers, addressable via pseudonyms.…”
Section: Location Privacy Protectionmentioning
confidence: 99%
“…For users of location-based service, these mixzones are service-free zones, in which the users' actual change of pseudonyms is done. Delakouridis et al [26] apply pseudonyms to the problem of storing and accessing location information in a privacy-preserving, decentralized manner, in their Share The Secret (STS) architecture. They propose to split the information to be protected according to Shamir secret sharing [11], and to distribute those shares on several servers, addressable via pseudonyms.…”
Section: Related Workmentioning
confidence: 99%