The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

k-Times Anonymous Authentication

Isamu TERANISHI, Jun FURUKAWA, Kazue SAKO

  • Full Text Views

    0

  • Cite this

Summary :

We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E92-A No.1 pp.147-165
Publication Date
2009/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E92.A.147
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Secure Protocol

Authors

Keyword