Advertisement

Anonymous Authentication from Public-Key Encryption Revisited

(Extended Abstract)
  • Daniel Slamanig
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7025)

Abstract

Anonymous authentication apparently seems to be an oxymoron, since authentication is the task of proving one’s identity to another party and anonymity is concerned with hiding one’s identity. However, there are quite different constructions like ring [5] and group signatures [1] to solve this task. We are focusing on anonymous authentication protocols using public-key encryption schemes as their underlying building block, which, in contrast to the aforementioned, do receive only little attention. However, such anonymous authentication protocols are much simpler than other constructions and they can provide significant advantages over the aforementioned approaches. Firstly, they are fully compatible with deployed public-key infrastructures (PKIs) and thus can be adopted very easily. Secondly, such schemes enjoy an “ad-hoc” character and thus do not require involved registration or setup procedures. This is especially advantageous in dynamic environments, e.g. when users dynamically join and leave the group of authorized users. In this context existing primitives like group signatures to date lack of an efficient and practical solution. Furthermore, the “ad-hoc” character of these schemes allows users to flexibly choose their level of anonymity, i.e. the size of the group (anonymity set), for the sake of improved efficiency and additionally do not suffer from linear complexity such as ring signatures.

References

  1. 1.
    Ateniese, G., Camenisch, J.L., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255–270. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Bellare, M., Boldyreva, A., Kurosawa, K., Staddon, J.: Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. IEEE Transactions on Information Theory 53(11), 3927–3943 (2007)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and Efficiently Searchable Encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Lindell, Y.: Anonymous Authentication. JPC 2(2) (2011)Google Scholar
  5. 5.
    Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Schechter, S.E., Parnell, T., Hartemink, A.J.: Anonymous Authentication of Membership in Dynamic Groups. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol. 1648, pp. 184–195. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  7. 7.
    Slamanig, D., Rass, S.: Anonymous But Authorized Transactions Supporting Selective Traceability. In: SECRYPT 2010, pp. 132–141. SciTePress (2010)Google Scholar
  8. 8.
    Slamanig, D., Schartner, P., Stingl, C.: Practical Traceable Anonymous Identification. In: SECRYPT 2009, pp. 225–232. INSTICC Press (2009)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Daniel Slamanig
    • 1
  1. 1.Carinthia University of Applied SciencesKlagenfurtAustria

Personalised recommendations