Constant-Size Dynamic $k$ -Times Anonymous Authentication

M. Au,Y. Mu,W. Susilo,Sherman S. M. Chow
DOI: https://doi.org/10.1109/JSYST.2012.2221931
IF: 4.802
2013-06-01
IEEE Systems Journal
Abstract:Dynamic <formula formulatype="inline"><tex Notation="TeX">$k$</tex></formula>-times anonymous authentication (<formula formulatype="inline"><tex Notation="TeX">$k$</tex></formula>-TAA) schemes allow members of a group to be authenticated anonymously by application providers for a bounded number of times, where application providers can independently and dynamically grant or revoke access right to members in their own group. In this paper, we construct a dynamic <formula formulatype="inline"><tex Notation="TeX">$k$</tex></formula>-TAA scheme with space and time complexities of <formula formulatype="inline"><tex Notation="TeX">$O(\log (k))$</tex></formula> and a variant, in which the authentication protocol only requires constant time and space complexities at the cost of <formula formulatype="inline"><tex Notation="TeX">$O(k)$</tex> </formula>-sized public key. We also describe some tradeoff issues between different system characteristics. We detail all the zero-knowledge proof-of-knowledge protocols involved and show that our construction is secure in the random oracle model under the <formula formulatype="inline"><tex Notation="TeX">$q$</tex></formula>-strong Diffie–Hellman assumption and <formula formulatype="inline"><tex Notation="TeX">$q$</tex></formula>-decisional Diffie–Hellman inversion assumption. We provide a proof-of-concept implementation, experiment on its performance, and show that our scheme is practical.
Mathematics,Computer Science
What problem does this paper attempt to address?