Password based anonymous authentication with private information retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura

Research output: Contribution to journalArticle

Abstract

This paper focuses on authentication with three types of entities: a user who sends an authentication request, a service provider who receives and verifies the request, and a database who supplies the service provider with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks and (2) the database cannot identify which user is authenticating. First, we show a protocol which satisfies Properties (2). Second, we show a protocol which satisfies Properties (1) and (2). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

Original languageEnglish
Pages (from-to)72-78
Number of pages7
JournalJournal of Digital Information Management
Volume9
Issue number2
Publication statusPublished - Apr 1 2011

Fingerprint

Information retrieval
information retrieval
Authentication
service provider
Private information
Data base
Service provider

All Science Journal Classification (ASJC) codes

  • Management Information Systems
  • Information Systems
  • Library and Information Sciences

Cite this

Password based anonymous authentication with private information retrieval. / Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto.

In: Journal of Digital Information Management, Vol. 9, No. 2, 01.04.2011, p. 72-78.

Research output: Contribution to journalArticle

@article{7b16a3f347aa4c00993e458038321e32,
title = "Password based anonymous authentication with private information retrieval",
abstract = "This paper focuses on authentication with three types of entities: a user who sends an authentication request, a service provider who receives and verifies the request, and a database who supplies the service provider with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks and (2) the database cannot identify which user is authenticating. First, we show a protocol which satisfies Properties (2). Second, we show a protocol which satisfies Properties (1) and (2). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].",
author = "Toru Nakamura and Shunsuke Inenaga and Daisuke Ikeda and Kensuke Baba and Hiroto Yasuura",
year = "2011",
month = "4",
day = "1",
language = "English",
volume = "9",
pages = "72--78",
journal = "Journal of Digital Information Management",
issn = "0972-7272",
publisher = "Digital Information Research Foundation",
number = "2",

}

TY - JOUR

T1 - Password based anonymous authentication with private information retrieval

AU - Nakamura, Toru

AU - Inenaga, Shunsuke

AU - Ikeda, Daisuke

AU - Baba, Kensuke

AU - Yasuura, Hiroto

PY - 2011/4/1

Y1 - 2011/4/1

N2 - This paper focuses on authentication with three types of entities: a user who sends an authentication request, a service provider who receives and verifies the request, and a database who supplies the service provider with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks and (2) the database cannot identify which user is authenticating. First, we show a protocol which satisfies Properties (2). Second, we show a protocol which satisfies Properties (1) and (2). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

AB - This paper focuses on authentication with three types of entities: a user who sends an authentication request, a service provider who receives and verifies the request, and a database who supplies the service provider with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks and (2) the database cannot identify which user is authenticating. First, we show a protocol which satisfies Properties (2). Second, we show a protocol which satisfies Properties (1) and (2). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

UR - http://www.scopus.com/inward/record.url?scp=79960675855&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79960675855&partnerID=8YFLogxK

M3 - Article

VL - 9

SP - 72

EP - 78

JO - Journal of Digital Information Management

JF - Journal of Digital Information Management

SN - 0972-7272

IS - 2

ER -