Anonymous authentication

P. Das Chowdhury, J. Malcolm, B. Christianson

    Research output: Contribution to journalArticlepeer-review


    The contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate the protocol with an example of authorization in a role based access mechanism.
    Original languageEnglish
    Pages (from-to)299-305
    JournalLecture Notes in Computer Science (LNCS)
    Issue numberSecurity Protocols
    Publication statusPublished - 2006


    Dive into the research topics of 'Anonymous authentication'. Together they form a unique fingerprint.

    Cite this