Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model

  • Mohammad Hasan Samadani
  • Mehdi Shajari
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6485)


Due to the personal nature of a mobile device, it is seen as a suitable medium for storing personal information and credentials. As a result, the mobile device becomes the owner’s identity-on-the-move. There are many situations in which a mobile user must offer a partial set of his identity to be able to use a service. However, only a minimal set of attributes is required by an Identity Verifier to identify a person or to correctly establish the person’s role, position or status should be used. Furthermore, the verifier must be sure that the user cannot repudiate his identity later, and the offered identity is valid. In this paper, we proposed, developed and analyzed a mobile partial identity management model that the mobile user can generate his non-repudiable minimal set of his identity. The user can be sure that the verifier cannot obtain any other identity attributes, and the verifier can be sure that this identity profile is valid and the user cannot repudiate it later. The presented model, the NRMI model, is a secure and efficient mobile partial identity management. It can be used in several scenarios and use cases as well as step-by-step identification scenarios and managing identity social groups.


Identification Security Privacy Non-Repudiation Mobile Identity Minimal Identity Non-Repudiable Minimal Mobile Identity Model NRMI 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hyppönen, K.: An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 207–222. Springer, Heidelberg (2008), doi:10.1007/978-3-540-69485-4CrossRefGoogle Scholar
  2. 2.
    Müller, G., Wohlgemuth, S.: Study on mobile identity management, FIDIS (Future of Identity in the Information Society) Deliverable D3.3 (2005),
  3. 3.
    Wohlgemuth, S., Jendricke, U., Gerdtom Markotten, D., Dorner, F., Müller, G.: Sicherheit und Benutzbarkeit durch Identitätsmanagement. In: Spath, D., Haasis, K. (eds.) Aktuelle Trends in der Softwareforschung - Tagungsband zum doITForschungstag, Stuttgart, pp. 241–260. IRB Verlag (2003)Google Scholar
  4. 4.
    Samadani, M.H., Shajari, M., Ahaniha, M.M.: Self-Proxy Mobile Signature, A new client based mobile signature model. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, Perth, Australia, April 20-23 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Mohammad Hasan Samadani
    • 1
  • Mehdi Shajari
    • 1
  1. 1.Computer Engineering and Information Technology DepartmentAmirkabir University of TechnologyTehranIran

Personalised recommendations