Anonymous authentication systems based on private information retrieval

Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the authentication-server cannot identify to which user a given authentication-request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

Original languageEnglish
Title of host publication2009 1st International Conference on Networked Digital Technologies, NDT 2009
Pages53-58
Number of pages6
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 1st International Conference on Networked Digital Technologies, NDT 2009 - Ostrava, Czech Republic
Duration: Jul 28 2009Jul 31 2009

Publication series

Name2009 1st International Conference on Networked Digital Technologies, NDT 2009

Conference

Conference2009 1st International Conference on Networked Digital Technologies, NDT 2009
CountryCzech Republic
CityOstrava
Period7/28/097/31/09

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Anonymous authentication systems based on private information retrieval'. Together they form a unique fingerprint.

Cite this