Abstract: Service providers (SPs) that allow anonymous access need to protect their services against misbehaving users. Several schemes are proposed to achieve anonymous revocation without a trusted third party, thus protecting users’ privacy. They either have linear computational complexity in the size of the blacklist (EPID, BLAC, BLACR), or require all misbehaviors being identified in a time window (PEREA, PERM).
Loading