2010 2nd International Conference on Information Technology Convergence and Services 2010
DOI: 10.1109/itcs.2010.5581260
View full text | Cite
|
Sign up to set email alerts
|

Abstract: Anonymous authentication is a method for privacy protection in web service. But, the nature of anonymous authentication, access control of service is seemed impossible because it doesn't know the user's characteristics. In our paper, we propose an anonymous authorization framework which uses qualification certificate and anonymous authentication based on Short Group Signatures [11]. Also, our qualification certificate is used as payment token. By using our proposed authorization protocol, users can use anonymo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
(15 reference statements)
0
1
0
Order By: Relevance
“…If necessary, the signature can be opened by a specific group manager to identify the signature's originator in case of a dispute. Several provably secure authentication schemes [8] [9] [10] [11] have been proposed to create anonymous memberships in which any member of a group can prove to the service provider (i.e., the verifier) that they are qualified to access a service or file; however, these schemes are impractical because they do not provide exclusive verification of revoked memberships. As proven by the fact that some members have been revoked, in contrast to the use of fixed time periods [12] by employing a one-way chain, Ateniese et al [13] require group members to prove that their membership does not appear on the current certificate revocation list (CRL).…”
Section: Introductionmentioning
confidence: 99%
“…If necessary, the signature can be opened by a specific group manager to identify the signature's originator in case of a dispute. Several provably secure authentication schemes [8] [9] [10] [11] have been proposed to create anonymous memberships in which any member of a group can prove to the service provider (i.e., the verifier) that they are qualified to access a service or file; however, these schemes are impractical because they do not provide exclusive verification of revoked memberships. As proven by the fact that some members have been revoked, in contrast to the use of fixed time periods [12] by employing a one-way chain, Ateniese et al [13] require group members to prove that their membership does not appear on the current certificate revocation list (CRL).…”
Section: Introductionmentioning
confidence: 99%