Virtual Identity Performance Evaluations of Anonymous Authentication in IDaaS Framework
نویسندگان
چکیده
منابع مشابه
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, *: corresponding author [email protected] 2,3 Department of Information Management, Nanhua University Chiayi 622 Taiwan, 2 [email protected] 3 [email protected] Tel: 886+ (0)5+272-1001 ext.56536 4 Institute of information systems and applications, National Tsing Hua University [email protected]...
متن کاملAnonymous Authentication
In this paper, we study the seemingly paradoxical notion of anonymous authentication: authenticating yourself without revealing your identity. Before studying the technical aspects of anonymous Internet connections and anonymous authentication, we begin with a discussion of privacy and why it is important. Although the necessity of privacy is well accepted in the computer security community, th...
متن کاملMulti-device Anonymous Authentication
Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples are Restricted Identification and Pseudonymous Signature schemes designed by the German Federal Office for Information Security for German personal identity cards. The main properties are that a user can authenticate himself with a single private key (s...
متن کاملAnonymous Authentication for Smartcards
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smartcard authentication. Currently the smartcards are used for many purposes e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without ou...
متن کاملAnonymous Authentication of Membershipin Dynamic
We present a series of protocols for authenticating an in-dividual's membership in a group without revealing that individual's identity and without restricting how the membership of the group may be changed. In systems using these protocols a single message to the authenticator may be used by an individual to replace her lost key or by a trusted third party to add and remove members of the grou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2904854