Abstract
A strategy for colluding Issuer and Verifier with DAA scheme was found to let such an adversary always distinguish honest Users that were issued ‘tagged’ certificates voiding anonymity property of DAA. Additional verification equation was introduced to detect such an attack.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have