Issue No. 03 - May/June (2007 vol. 5)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2007.52
Anna Lysyanskaya , Brown University
Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniques are fast, secure, and preserve privacy, so let's use them!
authentification, verification, cryptography
A. Lysyanskaya, "Authentication without Identification," in IEEE Security & Privacy, vol. 5, no. , pp. 69-71, 2007.