Computer Science ›› 2012, Vol. 39 ›› Issue (Z11): 33-35.

Previous Articles     Next Articles

Anonymous Authentication Scheme Based on Role Model of PMI

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Nowadays, the privacy protection is one of the most concerned problems. More and more users want to strengthen their own privacy preservation and hope that they can access the resources without providing personal sensi- five informations. An anonymous access control scheme is proposed which is based on PKI/PMI certificates. The trusted third party is introduced between users and the service provider. The role stated-attribute certificate(R}AC) and role assigned attribute certificate(RA-AC) are used to implement the anonymous authentication. Theoretical analysis shows that this solution provides the security,anonymity and no relevance.

Key words: Privacy protection, hrustcd third party, Anonymity, R}AC, RA-AC

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!