Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Anonymous authentication with subset queries (extended abstract)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Towards an analysis of onion routing security
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Secure web transaction with anonymous mobile agent over internet
Journal of Computer Science and Technology
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Short Signatures from the Weil Pairing
Journal of Cryptology
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Nymble: anonymous IP-address blocking
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
On the security of the tor authentication protocol
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
Privacy and authenticity are two critical aspects of security. Our goal is to construct a protocol using pairing based cryptography that provides all of the necessary security properties, as well as make the protocol compliant to as many applications/problem domains as possible. Some motivating applications for an anonymous authentication protocol are E-commerce, E-voting, E-library, E-cash, as well as some medical applications, and mobile agent applications. Typically there are three parties involved, the user, servers, and the trusted third party TTP. Each entity in the system registers with the TTP only once. In our design we construct a fully anonymous pairing based authentication scheme, which allows each user to authenticates themselves to a server without requiring the identity of the user to be revealed. Further, in order to to deal with malicious users, we provide the TTP the capability to track malicious users.