Anonymous Authentication Systems Based on Private Information Retrieval

被引:0
|
作者
Nakamura, Toru [1 ]
Inenaga, Shunsuke [1 ]
Ikeda, Daisuke [1 ]
Baba, Kensuke [1 ]
Yasuura, Hiroto [1 ]
机构
[1] Kyushu Univ, Grad Sch, Fac Informat Sci & Elect Engn, Nishi Ku, Fukuoka 8190395, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [41] Committed Private Information Retrieval
    Cao, Quang
    Tran, Hong Yen
    Dau, Son Hoang
    Yi, Xun
    Viterbo, Emanuele
    Feng, Chen
    Huang, Yu-Chih
    Zhu, Jingge
    Kruglik, Stanislav
    Kiah, Han Mao
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 393 - 413
  • [42] The Capacity of Private Information Retrieval
    Sun, Hua
    Jafar, Syed Ali
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4075 - 4088
  • [43] Timely Private Information Retrieval
    Banawan, Karim
    Arafa, Ahmed
    Ulukus, Sennur
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2268 - 2273
  • [44] Private Stateful Information Retrieval
    Patel, Sarvar
    Persiano, Giuseppe
    Yeo, Kevin
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1002 - 1019
  • [45] Hypercubes and Private Information Retrieval
    Basu, Anirban
    Xu, Rui
    Corena, Juan Camilo
    Kiyomoto, Shinsaku
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 509 - 515
  • [46] Lightweight Anonymous Authentication Protocols for RFID Systems
    Chen, Min
    Chen, Shigang
    Fang, Yuguang
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) : 1475 - 1488
  • [47] Semantic Private Information Retrieval
    Vithana, Sajani
    Banawan, Karim
    Ulukus, Sennur
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (04) : 2635 - 2652
  • [48] Heterogeneous Private Information Retrieval
    Mozaffari, Hamid
    Houmansadr, Amir
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [49] Quantum private set intersection cardinality and its application to anonymous authentication
    Shi, Run-hua
    Mu, Yi
    Zhong, Hong
    Zhang, Shun
    Cui, Jie
    INFORMATION SCIENCES, 2016, 370 : 147 - 158
  • [50] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Morteza Nikooghadam
    Journal of Medical Systems, 2014, 38