2004
DOI: 10.1007/978-3-540-30539-2_22
|View full text |Cite
|
Sign up to set email alerts
|

k-Times Anonymous Authentication (Extended Abstract)

Abstract: We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features that allow 1) no one, not even an authority, identify users who have been authenticated within the allowable number, and that allow 2) anyone to trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Although ident… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
117
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 115 publications
(117 citation statements)
references
References 29 publications
0
117
0
Order By: Relevance
“…Moreover, we propose and formalize a stronger variant of the detectability requirement [TFS04] called the public detectability. It requires that anyone can verify that the AP indeed provided a fair limit to all users regarding the number of accesses to their service.…”
Section: Our Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…Moreover, we propose and formalize a stronger variant of the detectability requirement [TFS04] called the public detectability. It requires that anyone can verify that the AP indeed provided a fair limit to all users regarding the number of accesses to their service.…”
Section: Our Contributionsmentioning
confidence: 99%
“…First, we present the previous mechanism of detecting over-timed users [TFS04] at the cost of O(k) exponentiations. We then show how this could be decreased to O(log k) and to O(1).…”
Section: Key Ideasmentioning
confidence: 99%
See 3 more Smart Citations