Information-theoretic privacy-preserving user authentication

被引:0
|
作者
Kazempour, Narges [1 ]
Mirmohseni, Mahtab [1 ]
Aref, Mohammad Reza [1 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Informat Syst & Secur Lab ISSL, Tehran, Iran
关键词
Authentication; Privacy; Information theory; Shamir secret sharing; SCHEME;
D O I
10.1007/s10207-024-00917-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (using his personal key) by the verifier(s), while simultaneously staying completely anonymous (even to the verifier). On the other hand, an attacker must fail to be authenticated. We analyze this problem from an information-theoretic perspective and propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the normalized total key rate whose maximization has a trade-off with establishing privacy. The problem is considered in two different scenarios: single-server scenario (only one verifier is considered, to which all the provers are connected) and multi-server scenario (N verifiers are assumed, where each verifier is connected to a subset of users). For both scenarios, two regimes are considered: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). We propose achievable schemes that satisfy the completeness, soundness, and privacy properties in both single-server and multi-server scenarios. In the finite size regime, the main idea is to generate the authentication keys according to a secret sharing scheme. We show that the proposed scheme in the special case of multi-server authentication in the finite size regime is optimal. In the asymptotic regime, we use a random binning-based scheme that relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime both in the single-server and multi-server scenarios.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] On the robustness of information-theoretic authentication in quantum cryptography
    Molotkov, S. N.
    LASER PHYSICS LETTERS, 2022, 19 (07)
  • [42] Flexible and Robust Privacy-Preserving Implicit Authentication
    Domingo-Ferrer, Josep
    Wu, Qianhong
    Blanco-Justicia, Alberto
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 18 - 34
  • [43] Privacy-Preserving Authentication Based on PUF for VANETs
    Li, Lihui
    Deng, Hanwen
    Zhai, Zhongyi
    Peng, Sheng-Lung
    FUTURE INTERNET, 2024, 16 (09)
  • [44] Privacy-Preserving Delegable Authentication in the Internet of Things
    Gritti, Clementine
    Onen, Melek
    Molva, Refik
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 861 - 869
  • [45] A Privacy-Preserving Authentication Scheme for VANETs with Exculpability
    Li S.
    Yang R.
    Chen J.
    Security and Communication Networks, 2023, 2023
  • [46] Privacy-Preserving Authorized RFID Authentication Protocols
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 108 - 122
  • [47] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [48] Privacy-Preserving Biometric Authentication: Challenges and Directions
    Pagnin, Elena
    Mitrokotsa, Aikaterini
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [49] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [50] Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures
    Zhang, Hui
    Li, Xuejun
    Tan, Syh-Yuan
    Lee, Ming Jie
    Jin, Zhe
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 5056 - 5069