Anonymous authentication systems based on private information retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

Original languageEnglish
Title of host publication2009 1st International Conference on Networked Digital Technologies, NDT 2009
Pages53-58
Number of pages6
DOIs
Publication statusPublished - 2009
Event2009 1st International Conference on Networked Digital Technologies, NDT 2009 - Ostrava, Czech Republic
Duration: Jul 28 2009Jul 31 2009

Publication series

Name2009 1st International Conference on Networked Digital Technologies, NDT 2009

Other

Other2009 1st International Conference on Networked Digital Technologies, NDT 2009
Country/TerritoryCzech Republic
CityOstrava
Period7/28/097/31/09

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Anonymous authentication systems based on private information retrieval'. Together they form a unique fingerprint.

Cite this