Dynamic Anonymous Credential Systems With Controllable Anonymity and Unlinkability

被引:0
|
作者
Hwang, Jung Yeon [1 ]
机构
[1] Sungshin Womens Univ, Dept Math, Seoul 02844, South Korea
关键词
Privacy; anonymous credential; controllable unlinkability; dynamic membership; zero-knowledge proof; GROUP SIGNATURES;
D O I
10.1109/ACCESS.2023.3343610
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present novel anonymous credential schemes that provide controllable opening and linking capability. In a normal situation, signers are allowed to prove their possession of attributes of credentials anonymously and in a user-controllable way. The proof can demonstrate that certified claims hold with a desired privacy level, such as proving that age is within a certain value or a pre-defined range. However, in case of misbehaviors or for accountability, the identity of a signer can be revealed or signatures can be anonymously linked using opening and linking keys, respectively. The proposed scheme is designed to work for dynamic credential management allowing for the issuance of new credentials and proper revocation. To prove the security of the proposed anonymous credential scheme, we first define a security model to capture basic properties, anonymity, traceability, non-frameability, and controllable unlinkability. We then demonstrate that it satisfies all these properties under the standard assumption, i.e., $q$ -strong Diffie-Hellman assumption in the random oracle model. Finally we provide a performance analysis of our scheme in terms of signature size and basic signing and verifying operations. Additionally, we present empirical results to show that the performance of our scheme is reasonably efficient.
引用
收藏
页码:142015 / 142029
页数:15
相关论文
共 50 条
  • [21] Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems
    Loh, Jia-Chng
    Guo, Fuchun
    Susilo, Willy
    [J]. COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [22] Introducing proxy zero-knowledge proof and utilization in anonymous credential systems
    Jannati, Hoda
    Salmasizadeh, Mahmoud
    Mohajeri, Javad
    Moradi, Amir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 161 - 172
  • [23] ANONYMITY AND ALCOHOLICS ANONYMOUS - REPLY
    DAVID
    [J]. JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1983, 249 (22): : 3019 - 3019
  • [24] Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication
    Yang, Yanjiang
    Lu, Haibing
    Liu, Joseph K.
    Weng, Jian
    Zhang, Youcheng
    Zhou, Jianying
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 141 - 151
  • [25] Interpretations of online anonymity in Alcoholics Anonymous and Narcotics Anonymous
    Rubya, Sabirat
    Yarosh, Svetlana
    [J]. Proceedings of the ACM on Human-Computer Interaction, 2017, 1 (CSCW)
  • [26] Anonymous Credential with Attributes Certification after Registration
    Teranishi, Isamu
    Furukawa, Jun
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 125 - 137
  • [27] Security analysis and fix of an anonymous credential system
    Yang, YJ
    Bao, F
    Deng, RH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 537 - 547
  • [28] Anonymous Credential Scheme Supporting Active Revocation
    Fan, Chun-I
    Wu, Chien-Nan
    Hsu, Jen-Chun
    Tseng, Yi-Fan
    Chen, Wen-Tsuen
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 127 - 132
  • [29] Probably Secure Efficient Anonymous Credential Scheme
    Wu, Chien-Nan
    Fan, Chun-, I
    Huang, Jheng-Jia
    Tseng, Yi-Fan
    Kikuchi, Hiroaki
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2018, 6 (03) : 18 - 35
  • [30] Anonymity analysis of P2P anonymous communication systems
    Zhang, Jia
    Duan, Haixin
    Liu, Wu
    Wu, Jianping
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 358 - 366