Authentication without Identification.

Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniqu...

全面介绍

书目详细资料
发表在:IEEE Security and privacy : building confidence in a networked world 5, 3 (2007).
主要作者: Lysyanskaya, A.
格式: 文件
语言:English