2009
DOI: 10.1007/s11277-009-9715-2
|View full text |Cite
|
Sign up to set email alerts
|

Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

Abstract: To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his ano… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Such protocols achieve client anonymity and are quite useful in many application scenarios due to their special concern about client privacy, such as anonymous comment submission system , online drug store and popular cloud computing (Section 1.3). Besides, they have also been employed to develop more complex solutions (e.g., those systems in ).…”
Section: Introductionmentioning
confidence: 99%
“…Such protocols achieve client anonymity and are quite useful in many application scenarios due to their special concern about client privacy, such as anonymous comment submission system , online drug store and popular cloud computing (Section 1.3). Besides, they have also been employed to develop more complex solutions (e.g., those systems in ).…”
Section: Introductionmentioning
confidence: 99%