Anonymous Authentication Systems Based on Private Information Retrieval

被引:0
|
作者
Nakamura, Toru [1 ]
Inenaga, Shunsuke [1 ]
Ikeda, Daisuke [1 ]
Baba, Kensuke [1 ]
Yasuura, Hiroto [1 ]
机构
[1] Kyushu Univ, Grad Sch, Fac Informat Sci & Elect Engn, Nishi Ku, Fukuoka 8190395, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [21] On the Existence of XOR-Based Codes for Private Information Retrieval with Private Side Information
    Krishnan K. H., Murali
    Harshan, Jagadeesh
    ENTROPY, 2021, 23 (10)
  • [22] New results on the storage-retrieval tradeoff in private information retrieval systems
    Guo T.
    Zhou R.
    Tian C.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 403 - 414
  • [23] Secure Storage and Retrieval of IoT Data Based on Private Information Retrieval
    Riad, Khaled
    Ke, Lishan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [24] Private Information Retrieval With Private Noisy Side Information
    ZivariFard, Hassan
    Chou, Remi A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (04) : 2886 - 2902
  • [25] 3PAA: A Private PUF Protocol for Anonymous Authentication
    Chaterjee, Urbi
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) : 756 - 769
  • [26] Secure and Private Information Retrieval (SAPIR) in Cloud Storage Systems
    Kiskani, Mohsen Karimzadeh
    Sadjadpour, Hamid R.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (12) : 12302 - 12312
  • [27] Quantum private information retrieval based on polarization rotation
    Yi, Yun-Hui
    Zhu, Chang-Hua
    Pei, Chang-Xing
    Quan, Dong-Xiao
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (10): : 2353 - 2357
  • [28] Extended Attribute Based Encryption for Private Information Retrieval
    Yinan, Shan
    Cao, Zhenfu
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 923 - 928
  • [29] Private Information Retrieval With Side Information
    Kadhe, Swanand
    Garcia, Brenden
    Heidarzadeh, Anoosheh
    El Rouayheb, Salim
    Sprintson, Alex
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (04) : 2032 - 2043
  • [30] An Efficient Private Information Retrieval Protocol Based on TFHE
    Tian, Haibo
    Lin, Yini
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 476 - 495