Group Signatures: Authentication With Privacy
Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Bertram Poettering
Abstract
In the age of digital interaction where synchronous and asynchronous communication of users
and exchange of data is increasingly carried out over unprotected public networks, including
the Internet, diverse wireless and mobile networks, the ability of an user to prove own identity
to the distant communication partner or to claim being the origin of transmitted data is
one of the central security goals subsumed under the notion of authentication. Cryptography
offers manifold techniques for achieving this property in different contexts and with different
techniques.
Publication
Survey for the Federal Office for Information Security, Germany