@article{Lindell_2011, title={Anonymous Authentication}, volume={2}, url={https://journalprivacyconfidentiality.org/index.php/jpc/article/view/590}, DOI={10.29012/jpc.v2i2.590}, abstractNote={In this paper, we study the seemingly paradoxical notion of <em>anonymous authentication</em>: authenticating yourself without revealing your identity. Before studying the technical aspects of anonymous Internet connections and anonymous authentication, we begin with a discussion of privacy and why it is important. Although the necessity of privacy is well accepted in the computer security community, the concrete reasons as to <em>why</em> are often not understood. We will demonstrate that such an understanding is crucial for providing technical solutions that solve the real problems at hand. Given this background, we briefly survey the known technologies for constructing anonymous Internet connections. Finally, we study how it is possible to achieve anonymous authentication (on top of anonymous Internet connections). We present definitions and a number of different protocols with different properties. In addition to the basic problem, we also show how it is possible (in a certain model) to achieve revocable anonymity, and explain why this is of importance.}, number={2}, journal={Journal of Privacy and Confidentiality}, author={Lindell, Yehuda}, year={2011}, month={Apr.} }