DocumentCode :
70018
Title :
Constant-Size Dynamic K-Times Anonymous Authentication
Author :
Man Ho Au ; Susilo, Willy ; Yi Mu ; Chow, Sherman S. M.
Author_Institution :
Centre for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
Volume :
7
Issue :
2
fYear :
2013
fDate :
Jun-13
Firstpage :
249
Lastpage :
261
Abstract :
Dynamic k-times anonymous authentication (k-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times, where application providers can independently and dynamically grant or revoke access right to members in their own group. In this paper, we construct a dynamic k-TAA scheme with space and time complexities of O(log(k)) and a variant, in which the authentication protocol only requires constant time and space complexities at the cost of O(k) -sized public key. We also describe some tradeoff issues between different system characteristics. We detail all the zero-knowledge proof-of-knowledge protocols involved and show that our construction is secure in the random oracle model under the q-strong Diffie-Hellman assumption and q-decisional Diffie-Hellman inversion assumption. We provide a proof-of-concept implementation, experiment on its performance, and show that our scheme is practical.
Keywords :
computational complexity; cryptographic protocols; O(k) -sized public key; application providers; authentication protocol; constant-size dynamic k -times anonymous authentication scheme; dynamic k-TAA scheme; q-decisional Diffie-Hellman inversion assumption; q-strong Diffie-Hellman assumption; random oracle model; space complexities; time complexities; zero-knowledge proof-of-knowledge protocols; Authentication; Complexity theory; Gold; Protocols; Public key; Anonymity; applied cryptography; authentication; implementation; pairings;
fLanguage :
English
Journal_Title :
Systems Journal, IEEE
Publisher :
ieee
ISSN :
1932-8184
Type :
jour
DOI :
10.1109/JSYST.2012.2221931
Filename :
6355604
Link To Document :
بازگشت