Constant-Size Dynamic $k$ -Times Anonymous Authentication

@article{Au2013ConstantSizeD,
  title={Constant-Size Dynamic \$k\$ -Times Anonymous Authentication},
  author={Man Ho Au and Willy Susilo and Yi Mu and Sherman S. M. Chow},
  journal={IEEE Systems Journal},
  year={2013},
  volume={7},
  pages={249-261}
}
Dynamic <formula formulatype="inline"><tex Notation="TeX">$k$</tex></formula>-times anonymous authentication (<formula formulatype="inline"><tex Notation="TeX">$k$</tex></formula>-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times, where application providers can independently and dynamically grant or revoke access right to members in their own group. In this paper, we construct a dynamic <formula formulatype="inline… CONTINUE READING
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

Periodic $K$ -Times Anonymous Authentication With Efficient Revocation of Violator’s Credential

IEEE Transactions on Information Forensics and Security • 2015
View 7 Excerpts
Highly Influenced

Expansions of CHAP: Modificationless on its structures of packet and data exchange

2015 International Conference on Information Systems Security and Privacy (ICISSP) • 2015
View 1 Excerpt

MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services

2015 IEEE International Conference on Services Computing • 2015
View 3 Excerpts

Time-Bound Anonymous Authentication for Roaming Networks

IEEE Transactions on Information Forensics and Security • 2015
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 43 references

k-Times Anonymous Authentication with a Constant Proving Cost

Public Key Cryptography • 2006
View 8 Excerpts
Highly Influenced

Accumulators from Bilinear Pairings and Applications

CT-RSA • 2005
View 12 Excerpts
Highly Influenced

A Verifiable Random Function With Short Proofs and Keys

IACR Cryptology ePrint Archive • 2004
View 16 Excerpts
Highly Influenced

Cryptographic privacy enhancing technologies

L. D. Nguyen
Ph.D. dissertation, Univ. Wollongong, Wollongong, NSW, Australia, 2005. • 2005
View 10 Excerpts
Highly Influenced

Dynamic k-Times Anonymous Authentication

IACR Cryptology ePrint Archive • 2005
View 5 Excerpts
Highly Influenced

Short Group Signatures

IACR Cryptology ePrint Archive • 2004
View 10 Excerpts
Highly Influenced

Short Signatures Without Random Oracles

IACR Cryptology ePrint Archive • 2004
View 10 Excerpts
Highly Influenced

Accumulators and U-Prove Revocation

Financial Cryptography • 2013
View 1 Excerpt

Similar Papers

Loading similar papers…