The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Privasi kekal menjadi isu untuk perkhidmatan IT. Pengguna bimbang bahawa sejarah penggunaan perkhidmatan mereka mungkin boleh dikesan kerana setiap pengguna diberikan pengecam tunggal sebagai cara pengesahan. Dalam makalah ini, kami mencadangkan skim pengesahan atribut tanpa nama sempurna yang tidak dapat dikenal pasti dan tidak dapat dikesan. Kemudian, kami membentangkan hasil penilaian sistem prototaip menggunakan PC dan telefon bimbit dengan skema. Skim yang dicadangkan menggunakan sijil buta diri yang boleh diubah oleh pengguna secara rawak; oleh itu sijil diubah suai untuk setiap pengesahan, dan skim pengesahan tidak dapat dikenal pasti dan tidak dapat dikesan. Tambahan pula, skim kami boleh membatalkan sijil boleh buta diri tanpa kebocoran maklumat sulit peribadi dan menyemak status pembatalan tanpa akses dalam talian.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Shinsaku KIYOMOTO, Kazuhide FUKUSHIMA, Toshiaki TANAKA, "Design of Anonymous Attribute Authentication Mechanism" in IEICE TRANSACTIONS on Communications,
vol. E92-B, no. 4, pp. 1112-1118, April 2009, doi: 10.1587/transcom.E92.B.1112.
Abstract: Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E92.B.1112/_p
Salinan
@ARTICLE{e92-b_4_1112,
author={Shinsaku KIYOMOTO, Kazuhide FUKUSHIMA, Toshiaki TANAKA, },
journal={IEICE TRANSACTIONS on Communications},
title={Design of Anonymous Attribute Authentication Mechanism},
year={2009},
volume={E92-B},
number={4},
pages={1112-1118},
abstract={Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.},
keywords={},
doi={10.1587/transcom.E92.B.1112},
ISSN={1745-1345},
month={April},}
Salinan
TY - JOUR
TI - Design of Anonymous Attribute Authentication Mechanism
T2 - IEICE TRANSACTIONS on Communications
SP - 1112
EP - 1118
AU - Shinsaku KIYOMOTO
AU - Kazuhide FUKUSHIMA
AU - Toshiaki TANAKA
PY - 2009
DO - 10.1587/transcom.E92.B.1112
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E92-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 2009
AB - Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.
ER -