TATA: Towards anonymous trusted authentication

被引:0
|
作者
Quercia, Daniele [1 ]
Hailes, Stephen [1 ]
Capra, Licia [1 ]
机构
[1] UCL, Dept Comp Sci, London WC1E 6BT, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile devices may share resources even in the presence of untrustworthy devices. To do so, each device may use a computational model that on input of reputation information produces trust assessments. Based on such assessments, the device then decides with whom to share: it will likely end up sharing only with the most trustworthy devices, thus isolating the untrustworthy ones. All of this is, however, theoretical in the absence of a general and distributed authentication mechanism. Currently, distributed trust frameworks do not offer an authentication mechanism that supports user privacy, whilst being resistant to "Sybil attacks". To fill the gap, we first analyze the general attack space that relates to anonymous authentication as it applies to distributed trust models. We then put forward a scheme that is based on blinded threshold signature: collections of devices certify pseudonyms without seeing them and without relying on a central authority. We finally discuss how the scheme tackles the authentication attacks.
引用
收藏
页码:313 / 323
页数:11
相关论文
共 50 条
  • [1] Anonymous RFID Authentication Using Trusted Computing Technologies
    Dietrich, Kurt
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 91 - 102
  • [2] Research and Security Analysis of Anonymous Identity Authentication in Trusted Computing
    Yang, Yang
    Zhang, Huanguo
    He, Fan
    Zhang, Bo
    [J]. 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 409 - +
  • [3] Towards Practical Anonymous Password Authentication
    Yang, Yanjiang
    Zhou, Jianying
    Wong, Jun Wen
    Bao, Feng
    [J]. 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 59 - 68
  • [4] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    [J]. Zhang, D.-D. (zhdd0411@163.com), 1600, Beijing University of Posts and Telecommunications (20):
  • [5] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG Dedong
    MA Zhaofeng
    NIU Xinxin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications., 2013, 20 (01) - 65
  • [6] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG De-dong
    MA Zhao-feng
    NIU Xin-xin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, (01) : 58 - 65
  • [7] Towards Lightweight Anonymous Entity Authentication for IoT Applications
    Yang, Yanjiang
    Cai, Haibin
    Wei, Zhuo
    Lu, Haibing
    Choo, Kim-Kwang Raymond
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 265 - 280
  • [8] Anonymous authentication
    Das Chowdhury, Partha
    Christianson, Bruce
    Malcolm, James
    [J]. SECURITY PROTOCOLS, 2006, 3957 : 299 - 311
  • [9] A dynamic anonymous authentication scheme with trusted fog computing in V2G networks
    Huang, Wenhua
    Du, Hongyuan
    Feng, Jingyu
    Han, Gang
    Zhang, Wenbo
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [10] Enhanced bio-trusted anonymous authentication routing technique of wireless body area network
    Sudha, R.
    Devapriya, M.
    [J]. BIOMEDICAL RESEARCH-INDIA, 2016, 27 : S276 - S282