Anonymous authentication systems based on private information retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

抄録

This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

元の言語英語
ホスト出版物のタイトル2009 1st International Conference on Networked Digital Technologies, NDT 2009
ページ53-58
ページ数6
DOI
出版物ステータス出版済み - 2009
イベント2009 1st International Conference on Networked Digital Technologies, NDT 2009 - Ostrava, チェコ共和国
継続期間: 7 28 20097 31 2009

その他

その他2009 1st International Conference on Networked Digital Technologies, NDT 2009
チェコ共和国
Ostrava
期間7/28/097/31/09

Fingerprint

Information retrieval
Authentication
Network protocols
Servers

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

これを引用

Nakamura, T., Inenaga, S., Ikeda, D., Baba, K., & Yasuura, H. (2009). Anonymous authentication systems based on private information retrieval. : 2009 1st International Conference on Networked Digital Technologies, NDT 2009 (pp. 53-58). [5272083] https://doi.org/10.1109/NDT.2009.5272083

Anonymous authentication systems based on private information retrieval. / Nakamura, Toru; Inenaga, Shunsuke; Ikeda, Daisuke; Baba, Kensuke; Yasuura, Hiroto.

2009 1st International Conference on Networked Digital Technologies, NDT 2009. 2009. p. 53-58 5272083.

研究成果: 著書/レポートタイプへの貢献会議での発言

Nakamura, T, Inenaga, S, Ikeda, D, Baba, K & Yasuura, H 2009, Anonymous authentication systems based on private information retrieval. : 2009 1st International Conference on Networked Digital Technologies, NDT 2009., 5272083, pp. 53-58, 2009 1st International Conference on Networked Digital Technologies, NDT 2009, Ostrava, チェコ共和国, 7/28/09. https://doi.org/10.1109/NDT.2009.5272083
Nakamura T, Inenaga S, Ikeda D, Baba K, Yasuura H. Anonymous authentication systems based on private information retrieval. : 2009 1st International Conference on Networked Digital Technologies, NDT 2009. 2009. p. 53-58. 5272083 https://doi.org/10.1109/NDT.2009.5272083
Nakamura, Toru ; Inenaga, Shunsuke ; Ikeda, Daisuke ; Baba, Kensuke ; Yasuura, Hiroto. / Anonymous authentication systems based on private information retrieval. 2009 1st International Conference on Networked Digital Technologies, NDT 2009. 2009. pp. 53-58
@inproceedings{c9e11002746a4c0392afb11e677637e5,
title = "Anonymous authentication systems based on private information retrieval",
abstract = "This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].",
author = "Toru Nakamura and Shunsuke Inenaga and Daisuke Ikeda and Kensuke Baba and Hiroto Yasuura",
year = "2009",
doi = "10.1109/NDT.2009.5272083",
language = "English",
isbn = "9781424446155",
pages = "53--58",
booktitle = "2009 1st International Conference on Networked Digital Technologies, NDT 2009",

}

TY - GEN

T1 - Anonymous authentication systems based on private information retrieval

AU - Nakamura, Toru

AU - Inenaga, Shunsuke

AU - Ikeda, Daisuke

AU - Baba, Kensuke

AU - Yasuura, Hiroto

PY - 2009

Y1 - 2009

N2 - This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

AB - This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

UR - http://www.scopus.com/inward/record.url?scp=70450185785&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70450185785&partnerID=8YFLogxK

U2 - 10.1109/NDT.2009.5272083

DO - 10.1109/NDT.2009.5272083

M3 - Conference contribution

AN - SCOPUS:70450185785

SN - 9781424446155

SP - 53

EP - 58

BT - 2009 1st International Conference on Networked Digital Technologies, NDT 2009

ER -