Loading...
Search for:
pseudonym-system
0.006 seconds
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems
, Article Security and Communication Networks ; Volume 6, Issue 2 , 2013 , Pages 161-172 ; 19390122 (ISSN) ; Salmasizadeh, M ; Mohajeri, J ; Moradi, A ; Sharif University of Technology
2013
Abstract
In pseudonym systems, users by means of pseudonyms anonymously interact with organizations to obtain credentials. The credential scheme constructed by Lysyanskaya and Camenisch is among the most complete credential systems, in which "all-or-nothing" sharing scheme is used to prevent users sharing their credentials. If a user cannot directly show a credential issued by an organization, she or he has to give her or his own secret key to someone else as a proxy; afterward, the proxy can show the credential on behalf of the user. Thus, according to the all-or-nothing property of the system, having the user's secret key, the proxy can use all credentials of the user for itself. To solve this...
Analysis of Authentication and Privacy Schemes in VANETs and Proposing Two Related Schemes
, M.Sc. Thesis Sharif University of Technology ; Mohajeri, Javad (Supervisor) ; Salmasizadeh, Mahmoud (Supervisor)
Abstract
Nowadays, intelligent transportation systems have become possible and practical with the help of vehicular ad-hoc networks. This network is a subset of mobile ad-hoc networks introduced and studied separately due to its unique properties. With the help of vehicular ad-hoc networks, the level of road and drivers safety is increased and safety messages can be sent to road side units or other vehicles, so real-time is one of the main requirements of these networks. Other advantages of implementing such networks include providing entertainment and internet access services.On the other hand, these networks face various challenges, including routing data packets, preserving security requirements,...