Anonymous Identification for Ad Hoc Group

被引:0
|
作者
Lu, Xingye [1 ]
Au, Man Ho [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
关键词
Cryptography; Anonymous Identification; Obfuscations; Ad Hoc Group; RING SIGNATURE; SECURITY MODELS; AUTHENTICATION; SCHEME;
D O I
10.1145/2897845.2897903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous identification scheme for ad hoc group allows a participant to identify himself as a member of a group of users in a way that his actual identity is not revealed. We propose a highly efficient construction of this cryptographic primitive in the symmetric key setting based on the idea of program obfuscation. The salient feature of our scheme is that only hash evaluations are needed. Consequently, our scheme outperforms all existing constructions for a reasonably large ad hoc group size (of around 50000 users) since no exponentiation nor pairing operation is involved. Technically, the participant only needs to evaluate one hash operation to identify himself. While the time complexity of the verifier is linearly in the size of the ad hoc group, the actual running time is rather insignificant since the constant factor of this linear dependence is the time of a single hash evaluation. To analyse the security of our proposal, we develop a security model to capture the security requirements of this primitive and prove that our construction satisfies these requirements in the random oracle model against unbounded attackers. Similar to other identification schemes secure in the random oracle model, our proposed protocol requires only two message flow.
引用
收藏
页码:583 / 591
页数:9
相关论文
共 50 条
  • [1] Anonymous identification in Ad hoc groups
    Dodis, Y
    Kiayias, A
    Nicolosi, A
    Shoup, V
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 609 - 626
  • [2] Blind spontaneous anonymous group signatures for ad hoc groups
    Chan, TK
    Fung, K
    Liu, JK
    Wei, VK
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 82 - 94
  • [3] Linkable spontaneous anonymous group signature for ad hoc groups
    Liu, JK
    Wei, VK
    Wong, DS
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 325 - 335
  • [4] Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach
    Yang, Xu
    Wu, Wei
    Liu, Joseph K.
    Chen, Xiaofeng
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 215 - 226
  • [5] Anonymous handshakes in mobile ad hoc networks
    Zhang, YC
    Liu, W
    Lou, WJ
    Fang, YG
    [J]. MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1193 - 1199
  • [6] Activating anonymous ad hoc radio networks
    Andrzej Pelc
    [J]. Distributed Computing, 2007, 19 : 361 - 371
  • [7] Activating anonymous ad hoc radio networks
    Pelc, Andrzej
    [J]. DISTRIBUTED COMPUTING, 2007, 19 (5-6) : 361 - 371
  • [8] Anonymous communications in mobile ad hoc networks
    Zhang, YC
    Liu, W
    Lou, WJ
    [J]. IEEE Infocom 2005: The Conference on Computer Communications, Vols 1-4, Proceedings, 2005, : 1940 - 1951
  • [9] Anonymous content sharing in ad hoc networks
    Kang, SS
    Mutka, MW
    Xiao, L
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 290 - 294
  • [10] Achieving anonymous communication in ad hoc networks
    Cheng, Dapeng
    Han, Jinsong
    Li, Mo
    Yang, Baijian
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1547 - +