DocumentCode
70018
Title
Constant-Size Dynamic K-Times Anonymous Authentication
Author
Man Ho Au ; Susilo, Willy ; Yi Mu ; Chow, Sherman S. M.
Author_Institution
Centre for Comput. & Inf. Security Res., Univ. of Wollongong, Wollongong, NSW, Australia
Volume
7
Issue
2
fYear
2013
fDate
Jun-13
Firstpage
249
Lastpage
261
Abstract
Dynamic k-times anonymous authentication (k-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times, where application providers can independently and dynamically grant or revoke access right to members in their own group. In this paper, we construct a dynamic k-TAA scheme with space and time complexities of O(log(k)) and a variant, in which the authentication protocol only requires constant time and space complexities at the cost of O(k) -sized public key. We also describe some tradeoff issues between different system characteristics. We detail all the zero-knowledge proof-of-knowledge protocols involved and show that our construction is secure in the random oracle model under the q-strong Diffie-Hellman assumption and q-decisional Diffie-Hellman inversion assumption. We provide a proof-of-concept implementation, experiment on its performance, and show that our scheme is practical.
Keywords
computational complexity; cryptographic protocols; O(k) -sized public key; application providers; authentication protocol; constant-size dynamic k -times anonymous authentication scheme; dynamic k-TAA scheme; q-decisional Diffie-Hellman inversion assumption; q-strong Diffie-Hellman assumption; random oracle model; space complexities; time complexities; zero-knowledge proof-of-knowledge protocols; Authentication; Complexity theory; Gold; Protocols; Public key; Anonymity; applied cryptography; authentication; implementation; pairings;
fLanguage
English
Journal_Title
Systems Journal, IEEE
Publisher
ieee
ISSN
1932-8184
Type
jour
DOI
10.1109/JSYST.2012.2221931
Filename
6355604
Link To Document