File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1455770.1455813
- Scopus: eid_2-s2.0-70349290797
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: PEREA: Towards practical TTP-free revocation in anonymous authentication
Title | PEREA: Towards practical TTP-free revocation in anonymous authentication |
---|---|
Authors | |
Keywords | Non-membership proofs Anonymous authentication Privacy-enhanced revocation Subjective blacklisting |
Issue Date | 2008 |
Citation | Proceedings of the ACM Conference on Computer and Communications Security, 2008, p. 333-343 How to Cite? |
Abstract | Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful TTPs capable of deanonymizing (or linking) users' connections. Recent schemes such as Biacklistable Anonymous Credentials (BLAG) and Enhanced Privacy ID (EPID) support "privacy-enhanced revocation" servers can revoke misbehaving users without a TTP's involvement, and without learning the revoked users' identities. In BLAC and EPID, however, the coniputation required for authentication at the server is linear in tire size (L) of the revocation list. We propose PEREA, a new anonymous authentication scheme for which this bottleneck computation is independent of the size of the revocation list. Instead, the time complexity of authentication is linear in the size (K « L) of a revocation window, the number of subsequent authentications before which a user's misbehavior must be recognized if the user is to be revoked. We prove the security of our construction, and have developed a prototype implementation of PEREA to validate its efficiency experimentally. Copyright 2008 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/280755 |
ISSN | 2023 SCImago Journal Rankings: 1.430 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tsang, Patrick P. | - |
dc.contributor.author | Ho Au, Man | - |
dc.contributor.author | Kapadia, Apu | - |
dc.contributor.author | Smith, Sean W. | - |
dc.date.accessioned | 2020-02-17T14:34:51Z | - |
dc.date.available | 2020-02-17T14:34:51Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | Proceedings of the ACM Conference on Computer and Communications Security, 2008, p. 333-343 | - |
dc.identifier.issn | 1543-7221 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280755 | - |
dc.description.abstract | Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful TTPs capable of deanonymizing (or linking) users' connections. Recent schemes such as Biacklistable Anonymous Credentials (BLAG) and Enhanced Privacy ID (EPID) support "privacy-enhanced revocation" servers can revoke misbehaving users without a TTP's involvement, and without learning the revoked users' identities. In BLAC and EPID, however, the coniputation required for authentication at the server is linear in tire size (L) of the revocation list. We propose PEREA, a new anonymous authentication scheme for which this bottleneck computation is independent of the size of the revocation list. Instead, the time complexity of authentication is linear in the size (K « L) of a revocation window, the number of subsequent authentications before which a user's misbehavior must be recognized if the user is to be revoked. We prove the security of our construction, and have developed a prototype implementation of PEREA to validate its efficiency experimentally. Copyright 2008 ACM. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the ACM Conference on Computer and Communications Security | - |
dc.subject | Non-membership proofs | - |
dc.subject | Anonymous authentication | - |
dc.subject | Privacy-enhanced revocation | - |
dc.subject | Subjective blacklisting | - |
dc.title | PEREA: Towards practical TTP-free revocation in anonymous authentication | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/1455770.1455813 | - |
dc.identifier.scopus | eid_2-s2.0-70349290797 | - |
dc.identifier.spage | 333 | - |
dc.identifier.epage | 343 | - |
dc.identifier.issnl | 1543-7221 | - |