Authentication without Identification.

Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniqu...

Полное описание

Библиографические подробности
Опубликовано в::IEEE Security and privacy : building confidence in a networked world 5, 3 (2007).
Главный автор: Lysyanskaya, A.
Формат: Статья
Язык:English