File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: PE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation

TitlePE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation
Authors
KeywordsAnonymous authentication
Computation efficiency
Efficiency improvement
Reputation systems
Service provider
Third parties
Issue Date2012
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
The 17th European Symposium on Research in Computer Security (ESORICS 2012), Pisa, Italy, 10-12 September 2012. In Lecture Notes in Computer Science, 2012, v. 7459, p. 679-696 How to Cite?
AbstractAnonymous authentication schemes allow users to act freely without being tracked. The users may not want to trust a third party in ensuring their privacy, yet a service provider (SP) should have the authority to blacklist a misbehaving user. They are seemingly contradicting requirements. PEREA was the most efficient solution to this problem. However, there are a few drawbacks which make it vulnerable and not practical enough. In this paper, we propose PE(AR)2, which not only fixes PEREA’s vulnerability, but also significantly improves its computation efficiency. Apart from revoking repeated misbehaving users, our system also rewards anonymous users via a built-in reputation system. Our scheme does not require the SP to timely review all previously authenticated sessions, and does not have the dependency on the blacklist size for user-side computation (c.f. EPID/BLAC(R)). Our benchmark on PE(AR)2 shows that an SP can handle over 160 requests/second – a 460-fold efficiency improvement over PEREA, when the credentials store 1000 single-use tickets. © 2012 Springer-Verlag.
Persistent Identifierhttp://hdl.handle.net/10722/184855
ISBN
ISSN
2005 Impact Factor: 0.402
2015 SCImago Journal Rankings: 0.252

 

DC FieldValueLanguage
dc.contributor.authorYu, KYen_US
dc.contributor.authorYuen, THen_US
dc.contributor.authorChow, SSMen_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorHui, LCKen_US
dc.date.accessioned2013-07-15T10:14:41Z-
dc.date.available2013-07-15T10:14:41Z-
dc.date.issued2012en_US
dc.identifier.citationThe 17th European Symposium on Research in Computer Security (ESORICS 2012), Pisa, Italy, 10-12 September 2012. In Lecture Notes in Computer Science, 2012, v. 7459, p. 679-696en_US
dc.identifier.isbn978-364233166-4-
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/10722/184855-
dc.description.abstractAnonymous authentication schemes allow users to act freely without being tracked. The users may not want to trust a third party in ensuring their privacy, yet a service provider (SP) should have the authority to blacklist a misbehaving user. They are seemingly contradicting requirements. PEREA was the most efficient solution to this problem. However, there are a few drawbacks which make it vulnerable and not practical enough. In this paper, we propose PE(AR)2, which not only fixes PEREA’s vulnerability, but also significantly improves its computation efficiency. Apart from revoking repeated misbehaving users, our system also rewards anonymous users via a built-in reputation system. Our scheme does not require the SP to timely review all previously authenticated sessions, and does not have the dependency on the blacklist size for user-side computation (c.f. EPID/BLAC(R)). Our benchmark on PE(AR)2 shows that an SP can handle over 160 requests/second – a 460-fold efficiency improvement over PEREA, when the credentials store 1000 single-use tickets. © 2012 Springer-Verlag.-
dc.languageengen_US
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_US
dc.relation.ispartofLecture Notes in Computer Scienceen_US
dc.rightsThe original publication is available at www.springerlink.com-
dc.subjectAnonymous authentication-
dc.subjectComputation efficiency-
dc.subjectEfficiency improvement-
dc.subjectReputation systems-
dc.subjectService provider-
dc.subjectThird parties-
dc.titlePE(AR)2: privacy-enhanced anonymous authentication with reputation and revocationen_US
dc.typeConference_Paperen_US
dc.identifier.emailYuen, TH: johnyuen@hku.hken_US
dc.identifier.emailChow, SSM: schow@cs.nyu.eduen_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_US
dc.identifier.emailHui, LCK: hui@cs.hku.hk-
dc.identifier.authorityYiu, SM=rp00207en_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.doi10.1007/978-3-642-33167-1_39-
dc.identifier.scopuseid_2-s2.0-84865583485-
dc.identifier.hkuros215062en_US
dc.identifier.volume7459en_US
dc.identifier.spage679en_US
dc.identifier.epage696en_US
dc.publisher.placeGermany-
dc.customcontrol.immutablesml 131009-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats