搜索结果: 1-12 共查到“军事学 anonymous authentication”相关记录12条 . 查询时间(0.093 秒)
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
anonymous authentication attribute collusion attack
2019/6/14
We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. We give two security definitions; resistance against collusion attacks ...
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) Impersonation attack Bogus message attack
2019/5/13
Protecting a driver’s privacy is one of the major concerns in vehicular ad hoc networks (VANETs). Currently, Azees et al. has proposed an efficient anonymous authentication protocol (EAAP) for VANETs....
Anonymous Authentication with Shared Secrets
Anonymity Authentication Key Indistinguishabilitiy
2016/1/26
Anonymity and authenticity are both important yet often
conflicting security goals in a wide range of applications. On the one
hand for many applications (say for access control) it is crucial to be...
Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication
deniability anonymity anonymous authentication
2016/1/7
In the problem of anonymous authentication (Boneh et al. CCS 1999), a sender wishes
to authenticate a message to a given recipient in a way that preserves anonymity: the recipient does
not know the ...
Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications
Anonymous credential system Fully decentralized protocol
2014/3/5
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous authentication pr...
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Mobile Phones Privacy Anonymity ARM TrustZone
2011/3/10
Although anonymous authentication has been extensively
studied, so far no scheme has been widely adopted in practice. A particular
issue with fully anonymous authentication schemes is that users
ca...
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
cryptographic protocols / Mobile Phones Privacy Anonymity ARM TrustZone
2012/3/29
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes is that users canno...
Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
privacy direct anonymous attestation anonymous authentication
2010/8/26
Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, we show how to i...
An Anonymous Authentication Scheme for Trusted Computing Platform
Privacy Direct Anonymous Attestation Trusted Computing Platform
2009/3/19
The Trusted Computing Platform is the industrial initiative
to implement computer security. However, privacy protection is a criti-
cal problem that must be solved in Trusted Computing Platform. In ...
Dynamic k-Times Anonymous Authentication
Dynamic k-Times Anonymous Authentication k-TAA dynamic k-TAA
2009/2/11
k-times anonymous authentication (k-TAA) schemes allow
members of a group to be anonymously authenticated by application
providers for a bounded number of times. k-TAA has application in evoting,
...
How to Win the Clone Wars:Efficient Periodic n-Times Anonymous Authentication
Clone Wars Efficient Periodic n-Times Anonymous Authentication
2009/1/6
We create a credential system that lets a user anonymously authenticate at most n times
in a single time period. A user withdraws a dispenser of n e-tokens. She shows an e-token to
a verifier to aut...
Efficient Dynamic k-Times Anonymous Authentication
privacy anonymity dynamic k-times anonymous authentication k-show anonymous credentials
2008/9/22
In k-times anonymous authentication (k-TAA) schemes,
members of a group can be anonymously authenticated to access applications
for a bounded number of times determined by application providers.
Dy...