Anonymous authentication systems based on private information retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

Original languageEnglish
Title of host publication2009 1st International Conference on Networked Digital Technologies, NDT 2009
Pages53-58
Number of pages6
DOIs
Publication statusPublished - 2009
Event2009 1st International Conference on Networked Digital Technologies, NDT 2009 - Ostrava, Czech Republic
Duration: Jul 28 2009Jul 31 2009

Other

Other2009 1st International Conference on Networked Digital Technologies, NDT 2009
CountryCzech Republic
CityOstrava
Period7/28/097/31/09

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Anonymous authentication systems based on private information retrieval'. Together they form a unique fingerprint.

  • Cite this

    Nakamura, T., Inenaga, S., Ikeda, D., Baba, K., & Yasuura, H. (2009). Anonymous authentication systems based on private information retrieval. In 2009 1st International Conference on Networked Digital Technologies, NDT 2009 (pp. 53-58). [5272083] https://doi.org/10.1109/NDT.2009.5272083