An anonymous authentication protocol with single-database PIR

Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

Original languageEnglish
Title of host publicationInformation Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011
Pages3-8
Number of pages6
Publication statusPublished - Dec 1 2011
Event9th Australasian Information Security Conference, AISC 2011 - Perth, WA, Australia
Duration: Jan 17 2011Jan 20 2011

Publication series

NameConferences in Research and Practice in Information Technology Series
Volume116
ISSN (Print)1445-1336

Other

Other9th Australasian Information Security Conference, AISC 2011
CountryAustralia
CityPerth, WA
Period1/17/111/20/11

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems
  • Software

Fingerprint Dive into the research topics of 'An anonymous authentication protocol with single-database PIR'. Together they form a unique fingerprint.

  • Cite this

    Nakamura, T., Inenaga, S., Baba, K., Ikeda, D., & Yasuura, H. (2011). An anonymous authentication protocol with single-database PIR. In Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011 (pp. 3-8). (Conferences in Research and Practice in Information Technology Series; Vol. 116).