Anonymous Authentication Using Secure Multi-Party Computations
Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if he or she is a registered user. During a typical authentication process, the au...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
KTH, Skolan för informations- och kommunikationsteknik (ICT)
2011
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-49826 |