Information-theoretic privacy-preserving user authentication

被引:0
|
作者
Kazempour, Narges [1 ]
Mirmohseni, Mahtab [1 ]
Aref, Mohammad Reza [1 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur Lab ISSL, Tehran, Iran
关键词
Authentication; Privacy; Information theory; Shamir secret sharing; SCHEME;
D O I
10.1007/s10207-024-00917-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (using his personal key) by the verifier(s), while simultaneously staying completely anonymous (even to the verifier). On the other hand, an attacker must fail to be authenticated. We analyze this problem from an information-theoretic perspective and propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the normalized total key rate whose maximization has a trade-off with establishing privacy. The problem is considered in two different scenarios: single-server scenario (only one verifier is considered, to which all the provers are connected) and multi-server scenario (N verifiers are assumed, where each verifier is connected to a subset of users). For both scenarios, two regimes are considered: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). We propose achievable schemes that satisfy the completeness, soundness, and privacy properties in both single-server and multi-server scenarios. In the finite size regime, the main idea is to generate the authentication keys according to a secret sharing scheme. We show that the proposed scheme in the special case of multi-server authentication in the finite size regime is optimal. In the asymptotic regime, we use a random binning-based scheme that relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime both in the single-server and multi-server scenarios.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [22] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [23] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [24] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [25] A privacy-preserving multifactor authentication system
    Acar, Abbas
    Liu, Wenyi
    Beyah, Raheem
    Akkaya, Kemal
    Uluagac, Arif Selcuk
    SECURITY AND PRIVACY, 2019, 2 (05):
  • [26] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    SN Computer Science, 4 (5)
  • [27] Information-Theoretic Approaches to Differential Privacy
    Unsal, Ayse
    Onen, Melek
    ACM COMPUTING SURVEYS, 2024, 56 (03)
  • [28] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Wang, Chenyu
    Wang, Ding
    Xu, Guoai
    He, Debiao
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [29] Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
    Hernandez-alvarez, Luis
    Maria de Fuentes, Jose
    Gonzalez-Manzano, Lorena
    Hernandez Encinas, Luis
    SENSORS, 2021, 21 (01) : 1 - 23
  • [30] Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience
    Tian, Yangguang
    Li, Yingjiu
    Chen, Rongmao
    Li, Nan
    Liu, Ximeng
    Chang, Bing
    Yu, Xingjie
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 112 - 132