How to Grant Anonymous Access

IEEE Transactions on Information Forensics and Security(2023)

Cited 1|Views36
No score
Abstract
In this paper, we propose three protocols to share, among a set of $N$ competing entities, the responsibility to grant anonymous access to a resource. The protocols we propose vary in their settings to take into account central or distributed registration. We prove that any subset of guardian authorities can neither tamper with, nor forge, new access-key tokens. Besides, two of the methods we propose are resistant to the eventual appearance of quantum computers. The protocols we propose permit new approaches for cryptographic applications such as electronic voting or blockchain access.
More
Translated text
Key words
Cryptography,distributed identification,one-time identification,anonymous access,post-quantum security
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined