Advanced authentication mechanisms
Authentication in the digital world usually relies on digital signature, a cryptographic mechanism introduced 45 years ago. It is a well-proven technology from the security standpoint but it is also fairly rigid in the sense that it does not allow to control the information leaked during authentication. This led cryptographers to introduce a wide variety of advanced authentication mechanisms which provide fine-grained control of the leaked information while retaining all the fundamental properties of digital signatures. These mechanisms have evolved considerably in recent years, from mere proofs of concepts to very efficient systems that can even compete with classical solutions. This presentation provides an overview of these mechanisms and their evolution and explains how they can advantageously replace digital signatures in many situations.