Anonymous authentication

  • Authors:
  • Partha Das Chowdhury;Bruce Christianson;James Malcolm

  • Affiliations:
  • Computer Science Department, University of Hertfordshire, UK;Computer Science Department, University of Hertfordshire, UK;Computer Science Department, University of Hertfordshire, UK

  • Venue:
  • SP'04 Proceedings of the 12th international conference on Security Protocols
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate the protocol with an example of authorization in a role based access mechanism.