Protocols for authenticated anonymous communications

被引:0
|
作者
Fathi, Hanane [1 ]
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Tokyo, Japan
[2] Chuo Univ, Tokyo 112, Japan
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications (e.g. net counselling and whistle blowing). On the other hand, anonymity may be abused for various malicious activities (e.g. redistribution of copy-righted contents and illegal drug trading). In this paper, we address both by proposing protocols for authenticated anonymous communications channels. In such channels, the client can authenticate the authentication server while the latter can only authenticate the fact that the client is one of the qualified members that are eligible to use the network (e.g. WLAN hot spots, WiMAX). Our protocols are based on an efficient anonymous password-based authenticated key exchange protocol and on an anonymous IP address assignment and have the following advantages: (1) they can restrict the usage of the established anonymous channels to certain fair purposes; (2) they do not involve rerouting of the packets through a chain of intermediate nodes; (3) they are available right after registration of a normal password to an authentication server as for a classical non-anonymous authentication (e.g. EAP-TTLS and PEAP) and do not require any special registration procedures that would reveal initially to the authentication server that the client belongs to a small list of users of anonymous services. Each protocol fits in a different authentication framework (IEEE802.1x and PANA) and is different with respect to providing controlled IP address assignment.
引用
收藏
页码:2275 / 2279
页数:5
相关论文
共 50 条
  • [41] Quantum communications with an anonymous receiver
    WANG TianYin 1
    2 School of Mathematical Science
    3 National Laboratory for Modern Communications
    Science China(Physics,Mechanics & Astronomy), 2010, Mechanics & Astronomy)2010 (12) : 2227 - 2231
  • [42] Quantum communications with an anonymous receiver
    Wang TianYin
    Wen QianYan
    Zhu FuChen
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2010, 53 (12) : 2227 - 2231
  • [43] Cryptanalysis of simple authenticated key agreement protocols
    Yang, CC
    Chang, TY
    Hwang, MS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08): : 2174 - 2176
  • [44] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng R.
    Wang L.
    International Journal of Ad Hoc and Ubiquitous Computing, 2020, 34 (04): : 249 - 257
  • [45] SECURE AND MINIMAL PROTOCOLS FOR AUTHENTICATED KEY DISTRIBUTION
    JANSON, P
    TSUDIK, G
    COMPUTER COMMUNICATIONS, 1995, 18 (09) : 645 - 653
  • [46] Authenticated Key Management Protocols for Internet of Things
    Li, Celia
    Yang, Cungang
    2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 126 - 129
  • [47] Secure and minimal protocols for authenticated key distribution
    IBM Zurich Research Lab, Ruschlikon, Switzerland
    Comput Commun, 9 (645-653):
  • [48] Modelling Time for Authenticated Key Exchange Protocols
    Schwenk, Joerg
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
  • [49] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [50] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257