An anonymous authentication scheme for mobile communication without trusted third party

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In order to provide anonymity services for mobile network users, ensure the confidentiality of the user's identity, we raised an anonymous authentication scheme without trusted third party. The scheme not only solves the problem of user's anonymity in the whole network, but also can open the message to track users when necessary, and achieve controllable anonymity. The scheme is implemented by difficult discrete logarithm problem and partially blind signature technology. Through the program's correctness, security analysis, the program is safe and reliable. © 2010 IEEE.

Cite

CITATION STYLE

APA

Liu, J. Y., Luo, S. S., Gu, L. Z., & Yang, Y. X. (2010). An anonymous authentication scheme for mobile communication without trusted third party. In ICCET 2010 - 2010 International Conference on Computer Engineering and Technology, Proceedings (Vol. 7). https://doi.org/10.1109/ICCET.2010.5485278

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free