Abstract

A strategy for colluding Issuer and Verifier with DAA scheme was found to let such an adversary always distinguish honest Users that were issued ‘tagged’ certificates voiding anonymity property of DAA. Additional verification equation was introduced to detect such an attack.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call