Information-theoretic privacy-preserving user authentication

被引:0
|
作者
Kazempour, Narges [1 ]
Mirmohseni, Mahtab [1 ]
Aref, Mohammad Reza [1 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur Lab ISSL, Tehran, Iran
关键词
Authentication; Privacy; Information theory; Shamir secret sharing; SCHEME;
D O I
10.1007/s10207-024-00917-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (using his personal key) by the verifier(s), while simultaneously staying completely anonymous (even to the verifier). On the other hand, an attacker must fail to be authenticated. We analyze this problem from an information-theoretic perspective and propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the normalized total key rate whose maximization has a trade-off with establishing privacy. The problem is considered in two different scenarios: single-server scenario (only one verifier is considered, to which all the provers are connected) and multi-server scenario (N verifiers are assumed, where each verifier is connected to a subset of users). For both scenarios, two regimes are considered: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). We propose achievable schemes that satisfy the completeness, soundness, and privacy properties in both single-server and multi-server scenarios. In the finite size regime, the main idea is to generate the authentication keys according to a secret sharing scheme. We show that the proposed scheme in the special case of multi-server authentication in the finite size regime is optimal. In the asymptotic regime, we use a random binning-based scheme that relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime both in the single-server and multi-server scenarios.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Privacy-Preserving OLAP: An Information-Theoretic Approach
    Zhang, Nan
    Zhao, Wei
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (01) : 122 - 138
  • [2] On the Asymptotic Capacity of Information-Theoretic Privacy-Preserving Epidemiological Data Collection
    Cheng, Jiale
    Liu, Nan
    Kang, Wei
    ENTROPY, 2023, 25 (04)
  • [3] A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach
    Wu, Ningbo
    Peng, Changgen
    Niu, Kun
    IEEE ACCESS, 2020, 8 (08): : 216741 - 216751
  • [4] Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach
    Zhang, Wenjing
    Jiang, Bo
    Li, Ming
    Lin, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 849 - 864
  • [5] PassBio: Privacy-Preserving User-Centric Biometric Authentication
    Zhou, Kai
    Ren, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) : 3050 - 3063
  • [6] Privacy-Preserving Biometric-Based Remote User Authentication
    Tian, Yangguang
    Li, Yingjiu
    Liu, Ximeng
    Deng, Robert H.
    Sengupta, Binanda
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2265 - 2276
  • [7] Lightweight and Privacy-Preserving Remote User Authentication for Smart Homes
    Nimmy, K.
    Sankaran, Sriram
    Achuthan, Krishnashree
    Calyam, Prasad
    IEEE ACCESS, 2022, 10 : 176 - 190
  • [8] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [9] Privacy-Preserving Fingercode Authentication
    Barni, Mauro
    Bianchi, Tiziano
    Catalano, Dario
    Di Raimondo, Mario
    Labati, Ruggero Donida
    Failla, Pierluigi
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 231 - 240
  • [10] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278