2008
DOI: 10.1504/ijmc.2008.019824
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous authentication for mobile Single Sign-On to protect user privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…RP) protected by the IdP, without revealing their identities. Anonymous SSO was proposed for the global system for mobile (GSM) communications [40], and the notion of anonymous SSO was formalized [41]. Privacy-preserving primitives, such as group signature, zero-knowledge proof, Chebyshev Chaotic Maps and proxy re-verification, etc., were adopted to design anonymous SSO systems [41][42][43][44].…”
Section: Extended Related Workmentioning
confidence: 99%
“…RP) protected by the IdP, without revealing their identities. Anonymous SSO was proposed for the global system for mobile (GSM) communications [40], and the notion of anonymous SSO was formalized [41]. Privacy-preserving primitives, such as group signature, zero-knowledge proof, Chebyshev Chaotic Maps and proxy re-verification, etc., were adopted to design anonymous SSO systems [41][42][43][44].…”
Section: Extended Related Workmentioning
confidence: 99%
“…1) Anonymous Single-Sign-On schemes: Elmufti et al [4] proposed an ASSO scheme which is suitable to the Global System for Mobile communication (GSM). In [4], to access a service, a user needs to generate a new one-time identity and uses it to authenticate to a trusted third party (TTP). If the authentication is successful, the TTP forwards the user's onetime identity to the service provider who provides the service.…”
Section: A Related Workmentioning
confidence: 99%
“…Anonymous single-sign-on schemes [18,24,36,27] exist which can protect a user's identity, but may not do so for all entities within a scheme. Moreover, a user's service request can be verified by all verifiers of a system rather than the one it is intended for which may pose a potential privacy risk to both the user and that verifier.…”
Section: Introductionmentioning
confidence: 99%