Anonymous Authentication Systems Based on Private Information Retrieval

被引:0
|
作者
Nakamura, Toru [1 ]
Inenaga, Shunsuke [1 ]
Ikeda, Daisuke [1 ]
Baba, Kensuke [1 ]
Yasuura, Hiroto [1 ]
机构
[1] Kyushu Univ, Grad Sch, Fac Informat Sci & Elect Engn, Nishi Ku, Fukuoka 8190395, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [31] Private information retrieval based on the subgroup membership problem
    Yamamura, A
    Saito, T
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 206 - 220
  • [32] Private Information Retrieval with Partially Known Private Side Information
    Wei, Yi-Peng
    Banawan, Karim
    Ulukus, Sennur
    2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018,
  • [33] One-server private information retrieval scheme combined with mutual authentication by ElGamal signature
    Chen, Chun-Hua
    Jan, Jinn-Ke
    Hsu, Chao-Hsing
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 300 - +
  • [34] Authenticated private information retrieval
    Colombo, Simone
    Nikitin, Kirill
    Corrigan-Gibbs, Henry
    Wu, David J.
    Ford, Bryan
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 3835 - 3851
  • [35] The Capacity of Private Information Retrieval
    Sun, Hua
    Jafar, Syed A.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [36] Tutorial: Private Information Retrieval
    Henry, Ryan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2608 - 2612
  • [37] Efficient private information retrieval
    Itoh, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 11 - 20
  • [38] Nearly private information retrieval
    Chakrabarti, Amit
    Shubina, Anna
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 383 - +
  • [39] Noisy Private Information Retrieval
    Banawan, Karim
    Ulukus, Sennur
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 1694 - 1698
  • [40] Verifiable Private Information Retrieval
    Ben-David, Shany
    Kalai, Yael Tauman
    Paneth, Omer
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT III, 2022, 13749 : 3 - 32