Abstract | ||
---|---|---|
The purpose of this paper is to provide an overview of current cryptographic Privacy-Enhancing Technologies (PETs) and show practical examples of services where these technologies can be deployed. In particular, the paper covers anonymous routing protocols, privacy-enhanced authentication systems and general-purpose systems like group signatures. Besides the overview of existing cryptographic technologies and relevant use-case scenarios, we provide also practical information regarding the performance of PETs on resource-restricted devices such as smart-cards, smart-phones and microcontrollers. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/TSP.2015.7296224 | 2015 38th International Conference on Telecommunications and Signal Processing (TSP) |
Keywords | Field | DocType |
Authentication,access control,cryptography,privacy,security | Authentication,Cryptographic protocol,Computer security,Computer science,Computer network,Cryptographic primitive,Controlled Cryptographic Item,Authentication protocol,Access control,Privacy-enhancing technologies,Privacy software | Conference |
Citations | PageRank | References |
0 | 0.34 | 12 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jan Hajny | 1 | 12 | 5.95 |
Lukas Malina | 2 | 21 | 5.85 |
Petr Dzurenda | 3 | 12 | 8.99 |