Anonymous Client Authentication for Transport Layer Security

Kurt Dietrich

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important. The anonymity of platforms and the privacy of users operating in the Internet are major concerns of current research activities. Although different techniques for protecting anonymity exist, standard protocols like Transport Layer Security are still missing adequate support for these technologies. In this paper, we analyze how Trusted Computing technologies and anonymous credential systems can be used in order to allow clients to establish anonymous authentication over secure channels. Furthermore, we analyze how these technologies can be integrated into common security frameworks like the Java Cryptography Architecture. We discuss the performance that can be achieved with this approach and analyse which performance can be expected from currently available Trusted Platform Modules.
Original languageEnglish
Title of host publicationCommunications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010
Subtitle of host publicationProceedings
Place of PublicationBerlin; Heidelberg
PublisherSpringer Berlin - Heidelberg
Pages268-280
ISBN (Print)978-3-642-13240-7
DOIs
Publication statusPublished - 2010
EventInternational Conference on Communications and Multimedia Security - Linz, Austria
Duration: 31 May 20102 Jun 2010

Publication series

NameLecture Notes in Computer Science
Volume6109

Conference

ConferenceInternational Conference on Communications and Multimedia Security
Country/TerritoryAustria
CityLinz
Period31/05/102/06/10

Fingerprint

Dive into the research topics of 'Anonymous Client Authentication for Transport Layer Security'. Together they form a unique fingerprint.

Cite this