An anonymous authentication protocol with single-database PIR

Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura

研究成果: 著書/レポートタイプへの貢献会議での発言

抄録

This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

元の言語英語
ホスト出版物のタイトルInformation Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011
ページ3-8
ページ数6
116
出版物ステータス出版済み - 2011
イベント9th Australasian Information Security Conference, AISC 2011 - Perth, WA, オーストラリア
継続期間: 1 17 20111 20 2011

その他

その他9th Australasian Information Security Conference, AISC 2011
オーストラリア
Perth, WA
期間1/17/111/20/11

Fingerprint

Authentication
Managers
Communication

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems
  • Software

これを引用

Nakamura, T., Inenaga, S., Baba, K., Ikeda, D., & Yasuura, H. (2011). An anonymous authentication protocol with single-database PIR. : Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011 (巻 116, pp. 3-8)

An anonymous authentication protocol with single-database PIR. / Nakamura, Toru; Inenaga, Shunsuke; Baba, Kensuke; Ikeda, Daisuke; Yasuura, Hiroto.

Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. 巻 116 2011. p. 3-8.

研究成果: 著書/レポートタイプへの貢献会議での発言

Nakamura, T, Inenaga, S, Baba, K, Ikeda, D & Yasuura, H 2011, An anonymous authentication protocol with single-database PIR. : Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. 巻. 116, pp. 3-8, 9th Australasian Information Security Conference, AISC 2011, Perth, WA, オーストラリア, 1/17/11.
Nakamura T, Inenaga S, Baba K, Ikeda D, Yasuura H. An anonymous authentication protocol with single-database PIR. : Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. 巻 116. 2011. p. 3-8
Nakamura, Toru ; Inenaga, Shunsuke ; Baba, Kensuke ; Ikeda, Daisuke ; Yasuura, Hiroto. / An anonymous authentication protocol with single-database PIR. Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011. 巻 116 2011. pp. 3-8
@inproceedings{a55d2ba12e5343a6859d663fc5206ce0,
title = "An anonymous authentication protocol with single-database PIR",
abstract = "This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.",
author = "Toru Nakamura and Shunsuke Inenaga and Kensuke Baba and Daisuke Ikeda and Hiroto Yasuura",
year = "2011",
language = "English",
isbn = "9781920682965",
volume = "116",
pages = "3--8",
booktitle = "Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011",

}

TY - GEN

T1 - An anonymous authentication protocol with single-database PIR

AU - Nakamura, Toru

AU - Inenaga, Shunsuke

AU - Baba, Kensuke

AU - Ikeda, Daisuke

AU - Yasuura, Hiroto

PY - 2011

Y1 - 2011

N2 - This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

AB - This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.

UR - http://www.scopus.com/inward/record.url?scp=84871192419&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871192419&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9781920682965

VL - 116

SP - 3

EP - 8

BT - Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011

ER -