2018
DOI: 10.1002/cpe.4706
|View full text |Cite
|
Sign up to set email alerts
|

A new privacy‐preserving authentication protocol for anonymous web browsing

Abstract: Anonymous authentication technique receives wide attention in recent years since it can protect users' privacy. Anonymous web browsing refers to utilization of the World Wide Web that hides a user's personally identifiable information from the websites visited. Even if a user can hide the IP address and other physical information with anonymity programs such as Tor, the web server can always monitor the user on the basis of the identity. In this paper, we firstly give an overview and cryptanalysis on the proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…The secure anonymous communication between users and service provider are realized. Yang et al [ 15 ] proposed a new anonymous network authentication protocol, which used pseudo identity mechanism and identity based elliptic curve system to achieve anonymity, robustness, and efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…The secure anonymous communication between users and service provider are realized. Yang et al [ 15 ] proposed a new anonymous network authentication protocol, which used pseudo identity mechanism and identity based elliptic curve system to achieve anonymity, robustness, and efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…A Java‐based prototype has been developed by the authors, and the authors test its malicious script alleviation capability on several web applications. Yang et al propose a novel privacy‐preserving authentication protocol for anonymous web browsing, which help users avoid being monitored by the web server on the basis of the identity. In particular, the proposed protocol makes use of a pseudoidentity mechanism and an identity‐based elliptic‐curve cryptography algorithm.…”
Section: Themes Of This Special Issuementioning
confidence: 99%