Title :
Constant-Size Dynamic K-Times Anonymous Authentication
Author :
Man Ho Au ; Susilo, Willy ; Yi Mu ; Chow, Sherman S. M.
Author_Institution :
Centre for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
Abstract :
Dynamic k-times anonymous authentication (k-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times, where application providers can independently and dynamically grant or revoke access right to members in their own group. In this paper, we construct a dynamic k-TAA scheme with space and time complexities of O(log(k)) and a variant, in which the authentication protocol only requires constant time and space complexities at the cost of O(k) -sized public key. We also describe some tradeoff issues between different system characteristics. We detail all the zero-knowledge proof-of-knowledge protocols involved and show that our construction is secure in the random oracle model under the q-strong Diffie-Hellman assumption and q-decisional Diffie-Hellman inversion assumption. We provide a proof-of-concept implementation, experiment on its performance, and show that our scheme is practical.
Keywords :
computational complexity; cryptographic protocols; O(k) -sized public key; application providers; authentication protocol; constant-size dynamic k -times anonymous authentication scheme; dynamic k-TAA scheme; q-decisional Diffie-Hellman inversion assumption; q-strong Diffie-Hellman assumption; random oracle model; space complexities; time complexities; zero-knowledge proof-of-knowledge protocols; Authentication; Complexity theory; Gold; Protocols; Public key; Anonymity; applied cryptography; authentication; implementation; pairings;
Journal_Title :
Systems Journal, IEEE
DOI :
10.1109/JSYST.2012.2221931