This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Authentication without Identification
May/June 2007 (vol. 5 no. 3)
pp. 69-71
Anna Lysyanskaya, Brown University
Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniques are fast, secure, and preserve privacy, so let's use them!
Index Terms:
authentification, verification, cryptography
Citation:
Anna Lysyanskaya, "Authentication without Identification," IEEE Security & Privacy, vol. 5, no. 3, pp. 69-71, May-June 2007, doi:10.1109/MSP.2007.52
Usage of this product signifies your acceptance of the Terms of Use.