An anonymous authentication protocol with single-database PIR

Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution


This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

Original languageEnglish
Title of host publicationInformation Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011
Number of pages6
Publication statusPublished - 2011
Event9th Australasian Information Security Conference, AISC 2011 - Perth, WA, Australia
Duration: Jan 17 2011Jan 20 2011

Publication series

NameConferences in Research and Practice in Information Technology Series
ISSN (Print)1445-1336


Other9th Australasian Information Security Conference, AISC 2011
CityPerth, WA

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems
  • Software


Dive into the research topics of 'An anonymous authentication protocol with single-database PIR'. Together they form a unique fingerprint.

Cite this