TY - GEN
T1 - An anonymous authentication protocol with single-database PIR
AU - Nakamura, Toru
AU - Inenaga, Shunsuke
AU - Baba, Kensuke
AU - Ikeda, Daisuke
AU - Yasuura, Hiroto
PY - 2011/12/1
Y1 - 2011/12/1
N2 - This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.
AB - This paper focuses on anonymous authentication systems in multi-service environment, in which service providers communicate with the central manager in every authentication. Such systems have a merit that the central manager can easily update the database of user information by comparison to the existing anonymous authentication systems without communications between service providers and the central manager. The purpose of this paper is to realize a practical authentication protocol for such systems which satisfies four requirements for security and privacy protection, that is, correctness, impersonation resistance against passive insider, anonymity against central manager, and anonymity against service providers. The existing protocol consists of a multi-database PIR scheme, in which there are copies of the same database and none of these copies are allowed to communicate with each other. This paper proposes an authentication protocol which consists of the single-database PIR scheme proposed by Kushilevitz and Ostrovsky. This protocol also realizes all these requirements in the random oracle model. This protocol is more practical since using a single database implies the above-mentioned assumptions for multi-database PIR schemes are not required any more.
UR - http://www.scopus.com/inward/record.url?scp=84871192419&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84871192419&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84871192419
SN - 9781920682965
T3 - Conferences in Research and Practice in Information Technology Series
SP - 3
EP - 8
BT - Information Security 2011 - Proceedings of the Ninth Australasian Information Security Conference, AISC 2011
T2 - 9th Australasian Information Security Conference, AISC 2011
Y2 - 17 January 2011 through 20 January 2011
ER -