In order to provide anonymity services for mobile network users, ensure the confidentiality of the user's identity, we raised an anonymous authentication scheme without trusted third party. The scheme not only solves the problem of user's anonymity in the whole network, but also can open the message to track users when necessary, and achieve controllable anonymity. The scheme is implemented by difficult discrete logarithm problem and partially blind signature technology. Through the program's correctness, security analysis, the program is safe and reliable. © 2010 IEEE.
CITATION STYLE
Liu, J. Y., Luo, S. S., Gu, L. Z., & Yang, Y. X. (2010). An anonymous authentication scheme for mobile communication without trusted third party. In ICCET 2010 - 2010 International Conference on Computer Engineering and Technology, Proceedings (Vol. 7). https://doi.org/10.1109/ICCET.2010.5485278
Mendeley helps you to discover research relevant for your work.