Anonymous Authentication Using Secure Multi-Party Computations

Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if he or she is a registered user. During a typical authentication process, the au...

Full description

Bibliographic Details
Main Author: Ahmad, Maqsood
Format: Others
Language:English
Published: KTH, Skolan för informations- och kommunikationsteknik (ICT) 2011
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-49826