The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2007 vol.5)
pp: 69-71
Anna Lysyanskaya , Brown University
ABSTRACT
Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniques are fast, secure, and preserve privacy, so let's use them!
INDEX TERMS
authentification, verification, cryptography
CITATION
Anna Lysyanskaya, "Authentication without Identification", IEEE Security & Privacy, vol.5, no. 3, pp. 69-71, May/June 2007, doi:10.1109/MSP.2007.52
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool