Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential

被引:13
|
作者
Lian, Bin [1 ,2 ]
Chen, Gongliang [1 ]
Ma, Maode [3 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[2] Zhejiang Univ, Ningbo Inst Technol, Ningbo 315100, Zhejiang, Peoples R China
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
中国国家自然科学基金;
关键词
K-times anonymous authentication; revocation of credential; zero-knowledge; truly anonymous; provably secure; FAIR E-CASH; ZERO-KNOWLEDGE; COMPACT; SIGNATURES; SYSTEM; ACCUMULATORS; ENCRYPTION;
D O I
10.1109/TIFS.2014.2386658
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a periodic K-times anonymous authentication system, user can anonymously show credential at most K times in one time period. In the next time period, user can automatically get another K-times authentication permission. If a user tries to show credential beyond K times in one time period, anyone can identify the dishonest user (the violator). But identifying violators is not enough for some systems, where it is also desirable to revoke violators' credentials for preventing them from abusing the anonymous property again. However, the problem of revoking credential without trusted third party has not been solved efficiently and practically. To solve it, we present an efficient scheme with efficient revocation of violator's credential. In fact, our method also solves an interesting problem-leaking information in a statistic zero-knowledge way, so our solution to the revocation problem outperforms all prior solutions. For achieving it, we use the special zero-knowledge proof with special information leak for revoking the violator's credential, but it can still be proven to be perfect statistic zero knowledge for guaranteeing the honest user's anonymity. Comparing with existing schemes, our scheme is efficient, and moreover, our method of revoking violator's credential is more practical with the least additional costs.
引用
收藏
页码:543 / 557
页数:15
相关论文
共 19 条
  • [1] Efficient dynamic k-times anonymous authentication
    Nguyen, Lan
    [J]. Progress in Cryptology - VIETCRYPT 2006, 2006, 4341 : 81 - 98
  • [2] k-Times Anonymous Authentication
    Teranishi, Isamu
    Furukawa, Jun
    Sako, Kazue
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 147 - 165
  • [3] Dynamic k-times anonymous authentication
    Nguyen, L
    Safavi-Naini, R
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 318 - 333
  • [4] k-Times anonymous authentication (extended abstract)
    Teranishi, I
    Furukawa, J
    Sako, K
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 308 - 322
  • [5] k-Times anonymous authentication with a constant proving cost
    Teranishi, Isamu
    Sako, Kazue
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 525 - 542
  • [6] A Selectable k-Times Relaxed Anonymous Authentication Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 281 - 295
  • [7] Constant-Size Dynamic k-Times Anonymous Authentication
    Au, Man Ho
    Susilo, Willy
    Mu, Yi
    Chow, Sherman S. M.
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 249 - 261
  • [8] ARBRA: Anonymous reputation-based revocation with efficient authentication
    Xi, Li
    Shao, Jianxiong
    Yang, Kang
    Feng, Dengguo
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8783 : 33 - 53
  • [9] Efficient and Anonymous Authentication With Succinct Multi-Subscription Credential in SAGVN
    Liu, Dongxiao
    Wu, Huaqing
    Ni, Jianbing
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (03) : 2863 - 2873
  • [10] k-Times Attribute-Based Anonymous Access Control for Cloud Computing
    Yuen, Tsz Hon
    Liu, Joseph K.
    Au, Man Ho
    Huang, Xinyi
    Susilo, Willy
    Zhou, Jianying
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2595 - 2608