Filters








322 Hits in 5.6 sec

Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability [chapter]

Martin Schaffer, Peter Schartner
2006 Lecture Notes in Computer Science  
In the second variant a set R of revocation centers is able to revoke the anonymity in collaboration with a trust center T but they are not able to link the revealed identity to other pseudonyms of the  ...  Using the third variant additionally provides linkability if R and T cooperate.  ...  AnonAuth 2 : Optional Anonymity Revocation / No Linkability. 3. AnonAuth 3 : Optional Anonymity Revocation / Optional Linkability.  ... 
doi:10.1007/11733447_15 fatcat:gm47oeqfanbjjol6vc7ppw6xsi

Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects

Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang
2013 IEEE Communications Magazine  
, flexible roaming in mobile contexts, as well as backward and forward non-linkabilities.  ...  In this article, we first identify the challenges unique to roaming services as a set of mandatory and optional requirements.  ...  Also, we are grateful to the anonymous reviewers for their valuable comments to improve the quality of the manuscript.  ... 
doi:10.1109/mcom.2013.6461199 fatcat:sxzktd7gjbespk52fcxmw2mrdq

Maintaining Integrity and Security for the Data Shared in the Cloud
ENGLISH

Gayathri Dili, Anu V.R
2016 International Journal of Innovative Research in Computer and Communication Engineering  
In this paper, we discuss about a system that helps to verify the integrity of data and also to make sure that, signatures are made by an authenticated signer. details that should match with the details  ...  Thus completed the user revocation and re-signing procedure. And this is how the existing system panda could prove the integrity maintenance.  ...  This found importance in privacy preserving data mining applications and customized anonymous authentication and thus promote controllable linkability.  ... 
doi:10.15680/ijircce.2016.0407002 fatcat:3vfvsjkcbvc37g6dnufulerovm

Formalizing Anonymous Blacklisting Systems

Ryan Henry, Ian Goldberg
2011 2011 IEEE Symposium on Security and Privacy  
In contrast to revocable anonymity systems, which enable some trusted third party to deanonymize users, anonymous blacklisting systems provide users with a way to authenticate anonymously with a service  ...  Recent research efforts have focused on using anonymous blacklisting systems (which are sometimes called anonymous revocation systems) to empower service providers with the ability to revoke access from  ...  Acknowledgements: We thank Roger Dingledine, the anonymous reviewers, and our shepherd Dan Wallach, for their helpful input. This work is supported by NSERC, OGS, MITACS, and a David R.  ... 
doi:10.1109/sp.2011.13 dblp:conf/sp/HenryG11 fatcat:v6besm6rgnhvnbfpdzjn333ete

Privacy-Preserving Identifiers for IoT: A Systematic Literature Review

Mahdi Akil, Lejla Islami, Simone Fischer-Hubner, Leonardo A. Martucci, Albin Zuccato
2020 IEEE Access  
Moreover, they give the user the option to generate her own pseudonym with specified attributes.  ...  [16] defines an authentication scheme for Ehealth, in which a device pseudonym is a result of a hash function using as input an id and a pre-shared secret value (shared between the device and a base  ... 
doi:10.1109/access.2020.3023659 fatcat:dc4dbijzljfyxn7hsrkuyfriby

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction

Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
2013 Theoretical Computer Science  
In this paper, we propose a new ID-based event-oriented linkable ring signature scheme, with an option as revocable-iff-linked.  ...  We prove the security Abstract In this paper, we propose a new ID-based event-oriented linkable ring signature scheme, with an option as revocable-iff-linked.  ...  Conclusion In this paper, we proposed a new construction of ID-based Linkable Ring Signature, with an option as Revocable-iff-Linked.  ... 
doi:10.1016/j.tcs.2012.10.031 fatcat:jpbvdrmgffedbpkwtabmijwmki

SDDR: Light-Weight, Secure Mobile Encounters

Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee
2014 USENIX Security Symposium  
selective linkability (users can recognize friends when strangers cannot) and efficient silent revocation (users can permanently or temporarily cloak themselves from certain friends, unilaterally and  ...  This level of energy consumption is four orders of magnitude more efficient than prior cryptographic protocols with proven security, and one order of magnitude more efficient than prior (unproven) protocols  ...  Acknowledgments We thank the anonymous reviewers and Jianqing Zhang for their helpful comments, as well as the Max Planck Society.  ... 
dblp:conf/uss/LentzEASDB14 fatcat:dpq5ii3gird7tmuku2z43qcs5e

Anonymous Services Using Smart Cards and Cryptography [chapter]

Sébastien Canard, Jacques Traoré
2004 IFIP International Federation for Information Processing  
In this paper, we first improve the cryptographic tool of [6] by proposing some optional modifications of list signature schemes such as anonymity revocation.  ...  For this reason, the authors of [6] proposed a variant that is partially linkable and not openable, called list signature scheme.  ...  Section 2 presents our technical implementations of list signatures with optionally anonymity revocation.  ... 
doi:10.1007/1-4020-8147-2_6 fatcat:bhtsfeknynfubbleguz2qo425m

Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology [chapter]

Xiaoyu Ruan
2014 Platform Embedded Security Technology Revealed  
The EPID is a novel technology that resolves all aspects of the active anonymity problem: authentication, anonymity, and revocation.  ...  Many times, people are willing to share their private information with the service providing site/server, and they rely on the vendors' good faith to protect their privacy and not share with third parties  ... 
doi:10.1007/978-1-4302-6572-6_5 fatcat:qm3r4kzjzfeofidgeb7awpl5fe

Design and implementation of the idemix anonymous credential system

Jan Camenisch, Els Van Herreweghen
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers.  ...  We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.  ...  Acknowledgements The authors are grateful to Marco Bove, Endre Bangerter, Roger Mathys, Martin Schaffer, and Dieter Sommer for their amazing Java programming making the idemix prototype reality.  ... 
doi:10.1145/586110.586114 dblp:conf/ccs/CamenischH02 fatcat:jt5wrnyx4bcpvoirtpcrk2yroq

Design and implementation of the idemix anonymous credential system

Jan Camenisch, Els Van Herreweghen
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers.  ...  We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.  ...  Acknowledgements The authors are grateful to Marco Bove, Endre Bangerter, Roger Mathys, Martin Schaffer, and Dieter Sommer for their amazing Java programming making the idemix prototype reality.  ... 
doi:10.1145/586111.586114 fatcat:ymu6mapaorg67ayatynzeviesa

Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV

Abdullah M. Almuhaideb, Sammar S. Algothami
2022 Journal of Sensor and Actuator Networks  
Therefore, we suggest benefiting from individual EVs that have excess energy and are willing to share it with other EVs in order to maximize the availability of EVCSs without the need to rely on the existing  ...  ., trade traceability to achieve anonymity, and so on) and security measures.  ...  However, privacy preservation fails to ensure the EV's anonymity, traceability, and un-linkability.  ... 
doi:10.3390/jsan11020028 fatcat:a62hmgdkpjhsfmiaabqtqat6t4

Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol [chapter]

Jesse Walker, Jiangtao Li
2011 Lecture Notes in Computer Science  
In this paper, we show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared key between them.  ...  Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication.  ...  Acknowledgement We thank Liqun Chen for her helpful discussions and feedback.  ... 
doi:10.1007/978-3-642-25283-9_8 fatcat:git2vz37zvacxigqnlwqnvfxze

Traceable Signature: Better Efficiency and Beyond [chapter]

He Ge, Stephen R. Tate
2006 Lecture Notes in Computer Science  
Some variants of group signature, such as traceable signature, and authentication with variable anonymity in a trusted computing platform, have also been proposed.  ...  In this paper we propose a traceable signature scheme with variable anonymity.  ...  DAA introduces the notion of "variable anonymity," which is conditionally linkable anonymous authentication: the same TPM will produce linkable signatures for a certain period of time.  ... 
doi:10.1007/11751595_36 fatcat:moj2aajtjfctjgfazutai53e5y

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers [chapter]

Wouter Lueks, Gergely Alpár, Jaap- Henk Hoepman, Pim Vullers
2015 IFIP Advances in Information and Communication Technology  
There exist many privacy-friendly revocation schemes, with different trade-offs in terms of efficiency (both for users and verifiers), connectivity requirements, and anonymity.  ...  To mitigate the linkability within an epoch, we explore the idea of using multiple generators in Section 6. Our revocation scheme works with most credential schemes.  ...  These eID cards can be used both offline and online for secure authentication with the government and sometimes with other parties, like shops.  ... 
doi:10.1007/978-3-319-18467-8_31 fatcat:b5gohmj63bezfk7scznxzd55ua
« Previous Showing results 1 — 15 out of 322 results