Preserving privacy in a network of mobile computers
- 19 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Even as wireless networks create the potential for access to information from mobile platforms, they pose a problem for privacy. In order to retrieve messages, users must periodically poll the network. The information that the user must give to the network could potentially be used to track that user. However, the movements of the user can also be used to hide the user's location if the protocols for sending and retrieving messages are carefully designed. We have developed a replicated memory service which allows users to read from memory without revealing which memory locations they are reading. Unlike previous protocols, our protocol is efficient in its use of computation and bandwidth. We show how this protocol can be used in conjunction with existing privacy preserving protocols to allow a user of a mobile computer to maintain privacy despite active attacks.Keywords
This publication has 13 references indexed in Scilit:
- Fast implementations of RSA cryptographyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- All-or-Nothing Disclosure of SecretsPublished by Springer Nature ,2000
- Optimal privacy and authentication on a portable communications systemACM SIGOPS Operating Systems Review, 1994
- Privacy and authentication on a portable communications systemIEEE Journal on Selected Areas in Communications, 1993
- Cryptographic defense against traffic analysisPublished by Association for Computing Machinery (ACM) ,1993
- Software technology for wireless mobile computingIEEE Network, 1991
- The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1988
- Networks without user observabilityComputers & Security, 1987
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978