Information-theoretic privacy-preserving user authentication

被引:0
|
作者
Kazempour, Narges [1 ]
Mirmohseni, Mahtab [1 ]
Aref, Mohammad Reza [1 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur Lab ISSL, Tehran, Iran
关键词
Authentication; Privacy; Information theory; Shamir secret sharing; SCHEME;
D O I
10.1007/s10207-024-00917-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (using his personal key) by the verifier(s), while simultaneously staying completely anonymous (even to the verifier). On the other hand, an attacker must fail to be authenticated. We analyze this problem from an information-theoretic perspective and propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the normalized total key rate whose maximization has a trade-off with establishing privacy. The problem is considered in two different scenarios: single-server scenario (only one verifier is considered, to which all the provers are connected) and multi-server scenario (N verifiers are assumed, where each verifier is connected to a subset of users). For both scenarios, two regimes are considered: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). We propose achievable schemes that satisfy the completeness, soundness, and privacy properties in both single-server and multi-server scenarios. In the finite size regime, the main idea is to generate the authentication keys according to a secret sharing scheme. We show that the proposed scheme in the special case of multi-server authentication in the finite size regime is optimal. In the asymptotic regime, we use a random binning-based scheme that relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime both in the single-server and multi-server scenarios.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] A new framework for privacy-preserving biometric-based remote user authentication
    Tian, Yangguang
    Li, Yingjiu
    Deng, Robert H.
    Li, Nan
    Wu, Pengfei
    Liu, Anyi
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (04) : 469 - 498
  • [32] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    R. Shashidhara
    Sriramulu Bojjagani
    Anup Kumar Maurya
    Saru Kumari
    Hu Xiong
    Peer-to-Peer Networking and Applications, 2020, 13 : 1943 - 1966
  • [33] Pufferfish Privacy: An Information-Theoretic Study
    Nuradha, Theshani
    Goldfeld, Ziv
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (11) : 7336 - 7356
  • [34] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Chenyu Wang
    Ding Wang
    Guoai Xu
    Debiao He
    Science China Information Sciences, 2022, 65
  • [35] User-empowered secure privacy-preserving authentication scheme for Digital Twin
    Patel, Chintan
    Pasikhani, Aryan
    Gope, Prosanta
    Clark, John
    COMPUTERS & SECURITY, 2024, 140
  • [36] On Security of Privacy-Preserving Remote User Authentication with K-Times Untraceability
    Zhang, Qijia
    Zhang, Jianhong
    Liu, Linhan
    Wang, Jing
    Liu, Pei
    International Journal of Network Security, 2021, 23 (03) : 449 - 454
  • [37] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    Shashidhara, R.
    Bojjagani, Sriramulu
    Maurya, Anup Kumar
    Kumari, Saru
    Xiong, Hu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 1943 - 1966
  • [38] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Chenyu WANG
    Ding WANG
    Guoai XU
    Debiao HE
    Science China(Information Sciences), 2022, 65 (01) : 192 - 206
  • [39] Prospect Theoretic Analysis of Privacy-Preserving Mechanism
    Liao, Guocheng
    Chen, Xu
    Huang, Jianwei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (01) : 71 - 83
  • [40] VoiceSketch: a Privacy-Preserving Voiceprint Authentication System
    Yan, Baochen
    Zhang, Rui
    Yan, Zheng
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 623 - 630