Protocols for authenticated anonymous communications

被引:0
|
作者
Fathi, Hanane [1 ]
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Tokyo, Japan
[2] Chuo Univ, Tokyo 112, Japan
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications (e.g. net counselling and whistle blowing). On the other hand, anonymity may be abused for various malicious activities (e.g. redistribution of copy-righted contents and illegal drug trading). In this paper, we address both by proposing protocols for authenticated anonymous communications channels. In such channels, the client can authenticate the authentication server while the latter can only authenticate the fact that the client is one of the qualified members that are eligible to use the network (e.g. WLAN hot spots, WiMAX). Our protocols are based on an efficient anonymous password-based authenticated key exchange protocol and on an anonymous IP address assignment and have the following advantages: (1) they can restrict the usage of the established anonymous channels to certain fair purposes; (2) they do not involve rerouting of the packets through a chain of intermediate nodes; (3) they are available right after registration of a normal password to an authentication server as for a classical non-anonymous authentication (e.g. EAP-TTLS and PEAP) and do not require any special registration procedures that would reveal initially to the authentication server that the client belongs to a small list of users of anonymous services. Each protocol fits in a different authentication framework (IEEE802.1x and PANA) and is different with respect to providing controlled IP address assignment.
引用
收藏
页码:2275 / 2279
页数:5
相关论文
共 50 条
  • [1] Universal Authentication Protocols for Anonymous Wireless Communications
    Yang, Guomin
    Huang, Qiong
    Wong, Duncan S.
    Deng, Xiaotie
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (01) : 168 - 174
  • [2] Provably secure anonymous authenticated key agreement protocols with enhanced security models
    Xie, Qi
    Tan, Xiao
    Hu, Bin
    Wang, Guilin
    Wong, Duncan S.
    Chen, Kefei
    Yu, XiuYuan
    SCIENCE, 2018, 360 (6387) : 27 - 28
  • [3] Anonymous Authenticated Communication
    Banfi, Fabio
    Maurer, Ueli
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 289 - 312
  • [4] AnonMAKE: Toward Secure and Anonymous Mutually Authenticated Key Exchange Protocol for Vehicular Communications
    Karati, Arijit
    Chang, Li-Chun
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, : 1 - 14
  • [5] Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA)
    Schermann, Raphael
    Urian, Rainer
    Toegl, Ronald
    Bock, Holger
    Steger, Christian
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 646 - 655
  • [6] A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel L.
    Soriente, Claudio
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1336 - 1353
  • [7] Anonymous Whistleblowing over Authenticated Channels
    Agrikola, Thomas
    Couteau, Geoffroy
    Maier, Sven
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 685 - 714
  • [8] Protocols for purpose-restricted anonymous communications in IP-based wireless networks
    Fathi, Hanane
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    COMPUTER COMMUNICATIONS, 2008, 31 (15) : 3662 - 3671
  • [9] Anonymous authentication protocols with credit-based chargeability and fair privacy for mobile communications
    Fan, Chun-, I
    Huang, Vincent Shi-Ming
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 412 - +
  • [10] Anonymous and authenticated key exchange for roaming networks
    Yang, Guomin
    Wong, Duncan S.
    Deng, Xiaotie
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (09) : 3461 - 3472