[2028] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Mobile phones used as trackers

daemon@ATHENA.MIT.EDU (Ulf =?iso-8859-1?Q?M=F6ller?=)
Fri Jan 2 10:40:02 1998

Date: Fri, 2 Jan 98 02:55 GMT+0100
From: 3umoelle@informatik.uni-hamburg.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: cryptography@c2.net
In-Reply-To: <199712302255.RAA09835@jekyll.piermont.com>

>Well, perhaps it could. In theory, Chaumian anonymous digital
>credentials could make it possible for one to design a protocol that
>permitted calls to be made anonymously and yet without fraud. On the
>other hand, such a protocol would not permit users to *receive* calls
>without being traced. However, perhaps some sort of cryptographic
>protocols could be used to reduce exposure here, too.

One approach is to use a decentralized trusted database for location
management.  The confidential information (the location information or
an ephemeral pseudonym) might be stored in a computer at the user's
home.  This technique can be combined with the usual protocols for
untraceable communication.

This is discussed in a number of papers by H. Federrath and others:

D. Kesdogan, H. Federrath, A. Jerichow, A. Pfitzmann: Location
Management Strategies increasing Privacy in Mobile Communication
Systems; IFIP SEC '96, Proceedings of the IFIP TC11, 39-48.
http://www.semper.org/sirene/lit/abstr96.html#FeJP1_96

H. Federrath, A. Jerichow, A. Pfitzmann: MIXes in Mobile Communication
Systems: Location Management with Privacy; Information Hiding 1996,
121-135.
http://www.semper.org/sirene/lit/abstr96.html#KFJP_96

H. Federrath, A. Jerichow, D. Kesdogan, A. Pfitzmann, O. Spaniol:
Mobilkommunikation ohne Bewegungsprofile; it+ti 38 (1996) 4, 24-29.
http://www.semper.org/sirene/lit/abstr96.html#FJKP_96


The issue of anonymity with mobile phones is also discussed in:

A. Herzberg, H. Krawczyk, G. Tsudik: On Travelling Incognito.
http://www.isi.edu/~gts/paps/hkt94.ps.gz

home help back first fref pref prev next nref lref last post