Anonymous Authentication Systems Based on Private Information Retrieval

被引:0
|
作者
Nakamura, Toru [1 ]
Inenaga, Shunsuke [1 ]
Ikeda, Daisuke [1 ]
Baba, Kensuke [1 ]
Yasuura, Hiroto [1 ]
机构
[1] Kyushu Univ, Grad Sch, Fac Informat Sci & Elect Engn, Nishi Ku, Fukuoka 8190395, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [1] Quantum Anonymous Private Information Retrieval for Distributed Networks
    Khan, Awais
    Khalid, Uman
    Ur Rehman, Junaid
    Shin, Hyundong
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (06) : 4026 - 4037
  • [2] Practical Quantum Anonymous Private Information Retrieval Based on Quantum Key Distribution
    Yang, Yu-Guang
    Liu, Bing-Xin
    Xu, Guang-Bao
    Zhou, Yi-Hua
    Shi, Wei-Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4034 - 4045
  • [3] Private Information Retrieval in Graph Based Replication Systems
    Raviv, Netanel
    Tamo, Itzhak
    2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 1739 - 1743
  • [4] AnonPri: A secure anonymous private authentication protocol for RFID systems
    Rahman, Farzana
    Hoque, Md Endadul
    Ahamed, Sheikh Iqbal
    INFORMATION SCIENCES, 2017, 379 : 195 - 210
  • [5] Private Location-Based Information Retrieval via k-Anonymous Clustering
    Rebollo-Monedero, David
    Forne, Jordi
    Soriano, Miguel
    INTERNET OF THINGS-BOOK, 2010, : 421 - 430
  • [6] On the Information Leakage in Private Information Retrieval Systems
    Guo, Tao
    Zhou, Ruida
    Tian, Chao
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1018 - 1023
  • [7] On the Information Leakage in Private Information Retrieval Systems
    Guo, Tao
    Zhou, Ruida
    Tian, Chao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 2999 - 3012
  • [8] Private Information Retrieval in Graph-Based Replication Systems
    Raviv, Netanel
    Tamo, Itzhak
    Yaakobi, Eitan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (06) : 3590 - 3602
  • [9] A Review of Anonymous Authentication Mechanisms for Health Information Management Systems
    bin Samsi, Muhammad Syafiq
    bin Abd Razak, Shukor
    2013 13TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2013, : 341 - 346
  • [10] An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems
    Fengtong Wen
    Dianli Guo
    Journal of Medical Systems, 2014, 38