Anonymous Authentication with Shared Secrets

被引:5
|
作者
Alwen, Joel [1 ]
Hirt, Martin [1 ]
Maurer, Ueli [1 ]
Patra, Arpita [2 ]
Raykov, Pavel [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] Indian Inst Sci, Dept Comp Sci & Automat, Bangalore 560012, Karnataka, India
来源
关键词
IDENTIFICATION; PRIVACY;
D O I
10.1007/978-3-319-16295-9_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of [Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of [BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.
引用
收藏
页码:219 / 236
页数:18
相关论文
共 50 条
  • [1] Anonymous Shared Certificate Entity Authentication Protocol
    Jian Zhou
    Xian-wei Zhou
    [J]. Wireless Personal Communications, 2013, 72 : 2761 - 2772
  • [2] Anonymous Shared Certificate Entity Authentication Protocol
    Zhou, Jian
    Zhou, Xian-wei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (04) : 2761 - 2772
  • [3] Key-exchange authentication using shared secrets
    Badra, M
    Hajjeh, I
    [J]. COMPUTER, 2006, 39 (03) : 58 - +
  • [4] Anonymous authentication with optional shared anonymity revocation and linkability
    Schaffer, Martin
    Schartner, Peter
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 206 - 221
  • [5] FULL SECURE KEY EXCHANGE AND AUTHENTICATION WITH NO PREVIOUSLY SHARED SECRETS
    FERRER, JDI
    ROTGER, LHI
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 665 - 670
  • [6] A Lightweight Anonymous Authentication Protocol Based on Shared Key in Wireless Networks
    无线网络中基于共享密钥的轻量级匿名认证协议
    [J]. Li, Xing-Hua (xhli1@mail.xidian.edu.cn), 2018, Science Press (41):
  • [7] Anonymous authentication
    Das Chowdhury, Partha
    Christianson, Bruce
    Malcolm, James
    [J]. SECURITY PROTOCOLS, 2006, 3957 : 299 - 311
  • [8] PRACTICAL ANONYMOUS AUTHENTICATION Designing Anonymous Authentication for Everyday Use
    Hajny, Jan
    Malina, Lukas
    Zeman, Vaclav
    [J]. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 405 - 408
  • [9] Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication
    Zhang, Zhenfeng
    Yang, Kang
    Hu, Xuexian
    Wang, Yuchen
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1179 - 1191
  • [10] Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication
    Yang, Yanjiang
    Lu, Haibing
    Liu, Joseph K.
    Weng, Jian
    Zhang, Youcheng
    Zhou, Jianying
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 141 - 151