Readme.md (view raw)
1Anonymous Authentication
2========================
3
4This software implements the anonymous authentication as described by Lindell, page 12
5(https://www.blackhat.com/presentations/bh-usa-07/Lindell/Whitepaper/bh-usa-07-lindell-WP.pdf).
6
7It uses the well known NaCl library for public key cryptography. To verify the client's anonymity in step 4,
8the cypher text must be deterministic. For this reason, a deterministic random number generator is used.
9
10## What's the use?
11
12Please refer to above paper to get an overview of what anonymous authentication is.