2018
DOI: 10.1002/dac.3542
|View full text |Cite
|
Sign up to set email alerts
|

Provable analysis and improvement of smart card–based anonymous authentication protocols

Abstract: Summary Nowadays, authentication protocols are essential for secure communications specially for roaming networks, distributed computer networks, and remote wireless communication. The numerous users in these networks rise vulnerabilities. Thus, privacy‐preserving methods have to be run to provide more reliable services and sustain privacy. Anonymous authentication is a method to remotely authenticate users with no revelation about their identity. In this paper, we analyze 2 smart card–based protocols that the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…The adversary 𝒜 is assumed as a probabilistic polynomial time (PPT) adversary who can present on public channels and eavesdrop (the eceive query) to learn a bit of knowledge about under‐auditing data. Additionally, it is able to send 𝒞 orrupt and eveal queries to the random oracle 25 …”
Section: The Zk‐based Dapmentioning
confidence: 99%
See 1 more Smart Citation
“…The adversary 𝒜 is assumed as a probabilistic polynomial time (PPT) adversary who can present on public channels and eavesdrop (the eceive query) to learn a bit of knowledge about under‐auditing data. Additionally, it is able to send 𝒞 orrupt and eveal queries to the random oracle 25 …”
Section: The Zk‐based Dapmentioning
confidence: 99%
“…Additionally, it is able to send orrupt and eveal queries to the random oracle. 25 Regarding the mentioned abilities of  and based on the proposed ZK-based DAP goals,  tries to learn a bit of knowledge about the under-auditing data (or break data confidentiality) so that ADV Confidentiality  > 𝜀.…”
Section: Threat Modelmentioning
confidence: 99%