University of Wollongong
Browse

Constant-size dynamic k-times anonymous authentication

Download (425.81 kB)
journal contribution
posted on 2024-11-15, 06:38 authored by Man Ho Allen Au, Willy SusiloWilly Susilo, Yi Mu, Sherman S M Chow
Dynamic k-times anonymous authentication (k-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times, where application providers can independently and dynamically grant or revoke access right to members in their own group. In this paper, we construct a dynamic k-TAA scheme with space and time complexities of O(log(k)) and a variant, in which the authentication protocol only requires constant time and space complexities at the cost of O(k) -sized public key. We also describe some tradeoff issues between different system characteristics. We detail all the zero-knowledge proof-of-knowledge protocols involved and show that our construction is secure in the random oracle model under the q-strong Diffie-Hellman assumption and q-decisional Diffie-Hellman inversion assumption. We provide a proof-of-concept implementation, experiment on its performance, and show that our scheme is practical.

History

Citation

Au, M. Ho., Susilo, W., Mu, Y. & Chow, S. S. M. (2013). Constant-size dynamic k-times anonymous authentication. IEEE Systems Journal, 7 (2), 249-261.

Journal title

IEEE Systems Journal

Volume

7

Issue

2

Pagination

249-261

Language

English

RIS ID

90225

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC