Group Signatures: Authentication With Privacy


In the age of digital interaction where synchronous and asynchronous communication of users and exchange of data is increasingly carried out over unprotected public networks, including the Internet, diverse wireless and mobile networks, the ability of an user to prove own identity to the distant communication partner or to claim being the origin of transmitted data is one of the central security goals subsumed under the notion of authentication. Cryptography offers manifold techniques for achieving this property in different contexts and with different techniques.

Survey for the Federal Office for Information Security, Germany