Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1968613.1968652acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A pairing based cryptographic anonymous authentication scheme

Published: 21 February 2011 Publication History

Abstract

Privacy and authenticity are two critical aspects of security. Our goal is to construct a protocol using pairing based cryptography that provides all of the necessary security properties, as well as make the protocol compliant to as many applications/problem domains as possible. Some motivating applications for an anonymous authentication protocol are E-commerce, E-voting, E-library, E-cash, as well as some medical applications, and mobile agent applications. Typically there are three parties involved, the user, servers, and the trusted third party TTP. Each entity in the system registers with the TTP only once. In our design we construct a fully anonymous pairing based authentication scheme, which allows each user to authenticates themselves to a server without requiring the identity of the user to be revealed. Further, in order to to deal with malicious users, we provide the TTP the capability to track malicious users.

References

[1]
Dan Boneh, Ben Lynn, and Hovav Shacham, "Short signatures from the Weil pairing", J. of Cryptology, Vol. 17, No. 4, pp. 297--319, 2004
[2]
Dan Boneh, Matt Franklin, "Anonymous Authentication with Subset Queries", In ACM Conference on Computer and Communications Security (CCS 1999), pp. 113--119, 1999
[3]
David Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM, Volume 24, Number 2, 1981
[4]
David Chaum, "Blind signatures for untraceable payments", CRYPTO 1982, pp. 199--203, 1982.
[5]
David Chaum and Eugene van Heyst, "Group signatures", EUROCRYPT 1991, pp. 257--265, 1991.
[6]
Roger Dingledine, Nick Mathewson, and Paul Syverson, "Tor: The Second-Generation Onion Router", In Usenix Security Symposium, pp. 303--320, 2004.
[7]
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, and Victor Shoup, "Anonymous Identification in Ad Hoc groups", EUROCRYPT, pp. 609--626, 2004
[8]
D. Dolev and A. C. Yao, "On the security of public key protocols", Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350--357, 1981.
[9]
Jan Camenisch, Anna Lysyanskaya "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", EUROCRYPT, pp. 93--118, 2001
[10]
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, Sean W. Smith, "Nymble: Anonymous IP-Address Blocking", In Privacy Enhancing Technologies Symposium, 2007
[11]
Goldberg," On the security of the tor authentication protocol",In Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, Springer, pp. 316--331, 2006.
[12]
A. Juels and R. Pappu, "Squealing euros: Privacy-protection in rfid-enabled banknotes," in Financial Cryptography. Springer-Verlag, pp. 103--121, 2003.
[13]
A. Juels, R. L. Rivest, and M. Szydlo, "The blocker tag: selective blocking of rfid tags for consumer privacy," in Proceedings of the 10th ACM conference on Computer and communication security. ACM Press, pp. 103--111, 2003.
[14]
M. K. Reiter and A. D. Rubin, "Crowds: Anonymity for web transactions", ACM Transactions on Information and System Security (TISSEC), Vol. 1, No. 1, pp. 66--92, 1998.
[15]
C. Shields and B. N. Levine," A protocol for anonymous communication over the internet",In ACM Conference on Computer and Communications Security (CCS 2000), pp. 33--42, 2000.
[16]
A. Singh and L. Liu., "TrustMe: Anonymous management of trust relationships in decentralized P2P systems", In Proceedings of The Third International Conference on Peer-to-Peer Computing (P2P 2003), pp. 142--149, 2003.
[17]
P.Syverson, G. Tsudik, M. Reed and C. Landwehr,"Towards an Analysis of Onion Routing Security", In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (July 2000), H. Federrath, Ed., Springer-Verlag, LNCS 2009, pp. 96--114, 2009.
[18]
ChangJie Wang, FangGuo Zhang, YuMin Wang, "Secure web transaction with anonymous mobile agent over internet", Journal of Computer Science and Technology, Vol. 18, No. 1, pp. 84--89, 2003
[19]
Bo Zhu, Sanjeev Setia, Sushil Jajodia "Providing Witness Anonymity in Peer-to-Peer Systems", In ACM Conference on Computer and Communications Security (CCS 2006), pp. 6--16, 2006

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '11: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
February 2011
959 pages
ISBN:9781450305716
DOI:10.1145/1968613
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 February 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. authentication
  3. pairing based cryptography
  4. privacy
  5. tracing

Qualifiers

  • Research-article

Conference

ICUIMC '11
Sponsor:

Acceptance Rates

ICUIMC '11 Paper Acceptance Rate 135 of 534 submissions, 25%;
Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 210
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media