Multifactor Identity Verification Using Aggregated Proof of Knowledge

被引:12
作者
Bhargav-Spantzel, Abhilasha [1 ]
Squicciarini, Anna Cinzia [2 ]
Xue, Rui [3 ]
Bertino, Elisa [4 ]
机构
[1] Intel Corp, Santa Barbara, CA 95054 USA
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16801 USA
[3] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[4] Purdue Univ, Ctr Educ & Res Informat Assurance & Secur, W Lafayette, IN 47907 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS | 2010年 / 40卷 / 04期
基金
中国国家自然科学基金;
关键词
Privacy; security;
D O I
10.1109/TSMCC.2010.2045755
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The problem of identity theft, that is, the act of impersonating others' identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper, we address the problem of verification of such identifiers and proofs of identity. Our approach is based on the concept of privacy preserving multifactor verification of such identifiers and proofs achieved by the development of a new cryptographic primitive, which uses aggregate signatures on commitments that are then used for aggregate zero-knowledge proof of knowledge (ZKPK) protocols. The resultant signatures are very short and the ZKPs are succinct and efficient. We prove the security of our scheme under the co-gap Diffie-Hellman (co-GDH) assumption for groups with bilinear maps. Our cryptographic scheme is an improvement in terms of the performance, flexibility, and storage requirements than the existing efficient ZKPK techniques that may be used to prove under zero knowledge and the knowledge of multiple secrets.
引用
收藏
页码:372 / 383
页数:12
相关论文
共 20 条
  • [1] Akagi N, 2008, LECT NOTES COMPUT SC, V5143, P272, DOI 10.1007/978-3-540-85230-8_25
  • [2] [Anonymous], 2002, P 9 ACM C COMPUTER C
  • [3] Establishing and protecting digital identity in federation systems
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Bertino, Elisa
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (03) : 269 - 300
  • [4] BHARGAVSPANTZEL A, 2010, IDTRUST GAITH MD
  • [5] Boneh D., 2001, INT C THEORY APPL CR, V2248, P514, DOI 10.1007/3-540-45682-130
  • [6] Boneh D., 2003, LNCS
  • [7] Brands S., 1994, LNCS, V773, P302, DOI [10.1007/3-540-48329-226, DOI 10.1007/3-540-48329-226]
  • [8] Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
  • [9] Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
  • [10] CAMENISCH J, 2004, ADV CRYPT CRYPTO SAN