Privacy-preserving authentication of trees and graphs

被引:0
|
作者
Ashish Kundu
Elisa Bertino
机构
[1] Yorktown Heights,IBM T J Watson Research Center
[2] Purdue University,Computer Science and CERIAS
关键词
Authenticity; Leakage-free; Privacy; Trees; Graphs;
D O I
暂无
中图分类号
学科分类号
摘要
Secure data sharing in third-party environments such as the cloud requires that both authenticity and confidentiality of the data be assured, especially when such structures encode sensitive information (such as in XML documents). Existing authentication schemes for trees and directed acyclic graphs (DAGs) are authenticity-preserving, but not confidentiality-preserving, and lead to leakage of sensitive information during authentication. In this paper, we propose a family of three leakage-free authentication schemes for (1) tree data structures, (2) directed acyclic graphs (DAGs), and (3) graphs (with cycles), which are also efficient. This family of schemes referred to as the “structural signatures” is based on the structure of the tree as defined by tree traversals and aggregate signatures. We also show through complexity and performance analysis that our scheme is practical in terms of the cost for authentication of data. We have also discussed two applications of the proposed scheme: (1) automatic correction and recovery from structural errors, and (2) secure publish /subscribe of XML documents.
引用
收藏
页码:467 / 494
页数:27
相关论文
共 50 条
  • [41] Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags
    Wei, Jiannan
    Li, Nan
    [J]. 2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2019,
  • [42] Hybrid conditional privacy-preserving authentication scheme for VANETs
    Shibin Wang
    Kele Mao
    Furui Zhan
    Dong Liu
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1600 - 1615
  • [43] A comprehensive survey on authentication and privacy-preserving schemes in VANETs
    Mundhe, Pravin
    Verma, Shekhar
    Venkatesan, S.
    [J]. COMPUTER SCIENCE REVIEW, 2021, 41
  • [44] Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs
    Zhou, Xiaotong
    Luo, Min
    Vijayakumar, Pandi
    Peng, Cong
    He, Debiao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) : 7863 - 7875
  • [45] Privacy-Preserving Authentication Systems Using Smart Devices
    Malina, Lukas
    Hajny, Jan
    Martinasek, Zdenek
    [J]. 2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 11 - 14
  • [46] Privacy-Preserving Universal Authentication Protocol for Wireless Communications
    He, Daojing
    Bu, Jiajun
    Chan, Sammy
    Chen, Chun
    Yin, Mingjian
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) : 431 - 436
  • [47] Privacy-Preserving Authentication Based on Group Signature for VANETs
    Zhu, Xiaoyan
    Jiang, Shunrong
    Wang, Liangmin
    Li, Hui
    Zhang, Weidong
    Li, Zan
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 4609 - 4614
  • [48] A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain
    Gao, Sheng
    Su, Qianqian
    Zhang, Rui
    Zhu, Jianming
    Sui, Zhiyuan
    Wang, Junsheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [49] Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
    Jo, Hyo Jin
    Paik, Jung Ha
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1469 - 1481
  • [50] Privacy-preserving continuous authentication using behavioral biometrics
    Ahmed Fraz Baig
    Sigurd Eskeland
    Bian Yang
    [J]. International Journal of Information Security, 2023, 22 : 1833 - 1847