Anonymous authentication systems based on private information retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

Original languageEnglish
Title of host publication2009 1st International Conference on Networked Digital Technologies, NDT 2009
Pages53-58
Number of pages6
DOIs
Publication statusPublished - 2009
Event2009 1st International Conference on Networked Digital Technologies, NDT 2009 - Ostrava, Czech Republic
Duration: Jul 28 2009Jul 31 2009

Other

Other2009 1st International Conference on Networked Digital Technologies, NDT 2009
CountryCzech Republic
CityOstrava
Period7/28/097/31/09

Fingerprint

Information retrieval
Authentication
Network protocols
Servers

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this

Nakamura, T., Inenaga, S., Ikeda, D., Baba, K., & Yasuura, H. (2009). Anonymous authentication systems based on private information retrieval. In 2009 1st International Conference on Networked Digital Technologies, NDT 2009 (pp. 53-58). [5272083] https://doi.org/10.1109/NDT.2009.5272083

Anonymous authentication systems based on private information retrieval. / Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto.

2009 1st International Conference on Networked Digital Technologies, NDT 2009. 2009. p. 53-58 5272083.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nakamura, T, Inenaga, S, Ikeda, D, Baba, K & Yasuura, H 2009, Anonymous authentication systems based on private information retrieval. in 2009 1st International Conference on Networked Digital Technologies, NDT 2009., 5272083, pp. 53-58, 2009 1st International Conference on Networked Digital Technologies, NDT 2009, Ostrava, Czech Republic, 7/28/09. https://doi.org/10.1109/NDT.2009.5272083
Nakamura T, Inenaga S, Ikeda D, Baba K, Yasuura H. Anonymous authentication systems based on private information retrieval. In 2009 1st International Conference on Networked Digital Technologies, NDT 2009. 2009. p. 53-58. 5272083 https://doi.org/10.1109/NDT.2009.5272083
Nakamura, Toru ; Inenaga, Shunsuke ; Ikeda, Daisuke ; Baba, Kensuke ; Yasuura, Hiroto. / Anonymous authentication systems based on private information retrieval. 2009 1st International Conference on Networked Digital Technologies, NDT 2009. 2009. pp. 53-58
@inproceedings{c9e11002746a4c0392afb11e677637e5,
title = "Anonymous authentication systems based on private information retrieval",
abstract = "This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].",
author = "Toru Nakamura and Shunsuke Inenaga and Daisuke Ikeda and Kensuke Baba and Hiroto Yasuura",
year = "2009",
doi = "10.1109/NDT.2009.5272083",
language = "English",
isbn = "9781424446155",
pages = "53--58",
booktitle = "2009 1st International Conference on Networked Digital Technologies, NDT 2009",

}

TY - GEN

T1 - Anonymous authentication systems based on private information retrieval

AU - Nakamura, Toru

AU - Inenaga, Shunsuke

AU - Ikeda, Daisuke

AU - Baba, Kensuke

AU - Yasuura, Hiroto

PY - 2009

Y1 - 2009

N2 - This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

AB - This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

UR - http://www.scopus.com/inward/record.url?scp=70450185785&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70450185785&partnerID=8YFLogxK

U2 - 10.1109/NDT.2009.5272083

DO - 10.1109/NDT.2009.5272083

M3 - Conference contribution

SN - 9781424446155

SP - 53

EP - 58

BT - 2009 1st International Conference on Networked Digital Technologies, NDT 2009

ER -