Loading...
Please wait, while we are loading the content...
Similar Documents
PEREA: Towards practical TTP-free revocation in anonymous authentication (2005)
| Content Provider | CiteSeerX |
|---|---|
| Author | Tsang, Patrick P. Au, Man Ho Kapadia, Apu Smith, Sean W. |
| Abstract | Several anonymous authentication schemes allow servers to revoke a misbehaving user’s ability to make future accesses. Traditionally, these schemes have relied on powerful TTPs capable of deanonymizing (or linking) users ’ connections. Recent schemes such as Blacklistable Anonymous Credentials (BLAC) and Enhanced Privacy ID (EPID) support “privacy-enhanced revocation ” — servers can revoke misbehaving users without a TTP’s involvement, and without learning the revoked users ’ identities. In BLAC and EPID, however, the computation required for authentication at the server is linear in the size (L) of the revocation list. We propose PEREA, a new anonymous authentication scheme for which this bottleneck computation is independent of the size of the revocation list. Instead, the time complexity of authentication is linear in the size (K ≪ L) of a revocation window, the number of subsequent authentications before which a user’s misbehavior must be recognized if the user is to be revoked. We prove the security of our construction, and have developed a prototype implementation of PEREA to validate its efficiency experimentally. |
| File Format | |
| Publisher Date | 2005-01-01 |
| Publisher Institution | In CCS ’08: 15th ACM conference on Computer and communications security (To Appear). ACM |
| Access Restriction | Open |
| Subject Keyword | Support Privacy-enhanced Revocation Server Revocation List User Connection Enhanced Privacy Id Prototype Implementation New Anonymous Authentication Scheme Time Complexity Anonymous Authentication Powerful Ttps Capable Ttp Involvement Several Anonymous Authentication Scheme Subsequent Authentication Revocation Window Blacklistable Anonymous Credential User Misbehavior Revoked User Identity Future Access Recent Scheme Misbehaving User Ability Bottleneck Computation |
| Content Type | Text |
| Resource Type | Conference Proceedings |