Unclonable dynamic k-times anonymous authentication
In previous works of k-times anonymous authentication,two problems have not been properly solved:1)how to allow application providers to assign different maximal numbers of access for each user without weakened anonymity,and 2)how to protect against massive clone attacks mounted by malicious users.T...
Saved in:
Main Authors: | Xin LIU, Qiu-liang XU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)07-0075-15/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Distributed anonymous authentication scheme based on the blockchain in VANET
by: Xia FENG, et al.
Published: (2022-09-01) -
Boardroom electronic voting scheme based on DC-net
by: Long-hai LI, et al.
Published: (2012-09-01) -
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
by: Houzhen WANG, et al.
Published: (2021-11-01) -
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
by: Vincent Omollo Nyangaresi, et al.
Published: (2025-01-01) -
Credible distributed identity authentication system of microgrid based on blockchain
by: Guanqun YANG, et al.
Published: (2021-12-01)