The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2007 vol. 5)
ISSN: 1540-7993
pp: 69-71
Anna Lysyanskaya , Brown University
Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniques are fast, secure, and preserve privacy, so let's use them!
authentification, verification, cryptography
Anna Lysyanskaya, "Authentication without Identification", IEEE Security & Privacy, vol. 5, no. , pp. 69-71, May/June 2007, doi:10.1109/MSP.2007.52
99 ms
(Ver 3.1 (10032016))