An anonymous authentication protocol with single-database PIR

Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

Original languageEnglish
Title of host publicationInformation Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011
Pages3-8
Number of pages6
Publication statusPublished - Dec 1 2011
Event9th Australasian Information Security Conference, AISC 2011 - Perth, WA, Australia
Duration: Jan 17 2011Jan 20 2011

Publication series

NameConferences in Research and Practice in Information Technology Series
Volume116
ISSN (Print)1445-1336

Other

Other9th Australasian Information Security Conference, AISC 2011
CountryAustralia
CityPerth, WA
Period1/17/111/20/11

Fingerprint

Authentication
Managers
Communication

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems
  • Software

Cite this

Nakamura, T., Inenaga, S., Baba, K., Ikeda, D., & Yasuura, H. (2011). An anonymous authentication protocol with single-database PIR. In Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011 (pp. 3-8). (Conferences in Research and Practice in Information Technology Series; Vol. 116).

An anonymous authentication protocol with single-database PIR. / Nakamura, Toru; Inenaga, Shunsuke; Baba, Kensuke; Ikeda, Daisuke; Yasuura, Hiroto.

Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. 2011. p. 3-8 (Conferences in Research and Practice in Information Technology Series; Vol. 116).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nakamura, T, Inenaga, S, Baba, K, Ikeda, D & Yasuura, H 2011, An anonymous authentication protocol with single-database PIR. in Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. Conferences in Research and Practice in Information Technology Series, vol. 116, pp. 3-8, 9th Australasian Information Security Conference, AISC 2011, Perth, WA, Australia, 1/17/11.
Nakamura T, Inenaga S, Baba K, Ikeda D, Yasuura H. An anonymous authentication protocol with single-database PIR. In Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. 2011. p. 3-8. (Conferences in Research and Practice in Information Technology Series).
Nakamura, Toru ; Inenaga, Shunsuke ; Baba, Kensuke ; Ikeda, Daisuke ; Yasuura, Hiroto. / An anonymous authentication protocol with single-database PIR. Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. 2011. pp. 3-8 (Conferences in Research and Practice in Information Technology Series).
@inproceedings{a55d2ba12e5343a6859d663fc5206ce0,
title = "An anonymous authentication protocol with single-database PIR",
abstract = "This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.",
author = "Toru Nakamura and Shunsuke Inenaga and Kensuke Baba and Daisuke Ikeda and Hiroto Yasuura",
year = "2011",
month = "12",
day = "1",
language = "English",
isbn = "9781920682965",
series = "Conferences in Research and Practice in Information Technology Series",
pages = "3--8",
booktitle = "Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011",

}

TY - GEN

T1 - An anonymous authentication protocol with single-database PIR

AU - Nakamura, Toru

AU - Inenaga, Shunsuke

AU - Baba, Kensuke

AU - Ikeda, Daisuke

AU - Yasuura, Hiroto

PY - 2011/12/1

Y1 - 2011/12/1

N2 - This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

AB - This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

UR - http://www.scopus.com/inward/record.url?scp=84871192419&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871192419&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9781920682965

T3 - Conferences in Research and Practice in Information Technology Series

SP - 3

EP - 8

BT - Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011

ER -