Comparison of Anonymous Authentication Protocols

  • Kim, Jongseong (International Research center for Information Security(IRIS), ICU) ;
  • Kim, Kwangjo (International Research center for Information Security(IRIS), ICU)
  • Published : 2002.11.01

Abstract

An anonymous authentication scheme allows a user to identify himself as a member of a group of users in a secure and anonymous way. It seems to be crucial and indispensable components in English auction, electronic voting and open procurement, which are getting very popular business areas in E-commerce. First, we briefly describe the previous anonymous authentication protocols how to work and what cryptographic techniques adopted to increase performance and achieve anonymity. Second, we compare those protocols from the viewpoint of the communication and computation complexity and the specific cryptographic techniques used in their protocols.

Keywords