On using RSA with low exponent in a public key network
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
ACM Transactions on Computer Systems (TOCS)
A cryptographic library for the Motorola DSP56000
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Blind Threshold Signatures Based on Discrete Logarithm
ASIAN '96 Proceedings of the Second Asian Computing Science Conference on Concurrency and Parallelism, Programming, Networking, and Security
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Formal Verification of Cryptographic Protocols: A Survey
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
A Multi-Recastable Ticket Scheme for Electronic Elections
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Anonymity in a Mobile Computing Environment
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
Low-exponent RSA with related messages
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
An improved algorithm for computing logarithms over and its cryptographic significance (Corresp.)
IEEE Transactions on Information Theory
A modification of the RSA public-key encryption procedure (Corresp.)
IEEE Transactions on Information Theory
Privacy and authentication on a portable communications system
IEEE Journal on Selected Areas in Communications
Fair blind threshold signatures in wallet with observers
Journal of Systems and Software
A new design of efficient partially blind signature scheme
Journal of Systems and Software
Private Authentication Techniques for the Global Mobility Network
Wireless Personal Communications: An International Journal
D-cash: A flexible pre-paid e-cash scheme for date-attachment
Electronic Commerce Research and Applications
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
Partially Blind Threshold Signature Based on RSA
Informatica
An IPSec-based key management algorithm for mobile IP networks
WSEAS TRANSACTIONS on COMMUNICATIONS
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
IPSec-based key management in mobile IP networks
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
A practical anonymous off-line multi-authority payment scheme
Electronic Commerce Research and Applications
Journal of Systems and Software
Mobile EC service applications by privacy management
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A mobile-based marketing information management system
CBMS'03 Proceedings of the 16th IEEE conference on Computer-based medical systems
An efficient and secure multi-server authentication scheme with key agreement
Journal of Systems and Software
The design of a secure and fair sealed-bid auction service
Mathematical and Computer Modelling: An International Journal
Security and Communication Networks
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.24 |
In this paper, we propose a scheme for providing anonymous channel service in wireless communications. By this service, many interesting applications, such as electronic elections, anonymous group discussions, with user identification confidential can be easily realized. No one can trace a sender's identification and no one but the authority centre can distinguish an anonymous message from a normal message when a user uses the anonymous channel. The user anonymity in our scheme is neither based on any trusted authority nor on the cooperation of all potential senders. Our scheme can be easily applied to existing wireless systems, such as GSM and CDPD, without changing their underlying structures.