Privacy-preserving remote user authentication with K-times untraceability

Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where authorized users authenticate themselves to an au...

Full description

Saved in:
Bibliographic Details
Main Authors: TIAN, Yangguang, LI, Yingjiu, SENGUPTA, Binanda, DENG, Robert H., CHING, Albert, LIU, Weiwei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2018
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4365
https://ink.library.smu.edu.sg/context/sis_research/article/5368/viewcontent/46.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5368
record_format dspace
spelling sg-smu-ink.sis_research-53682020-03-30T08:03:46Z Privacy-preserving remote user authentication with K-times untraceability TIAN, Yangguang LI, Yingjiu SENGUPTA, Binanda DENG, Robert H. CHING, Albert LIU, Weiwei Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where authorized users authenticate themselves to an authority (typically a server) in an anonymous and k-times untraceable manner. We define the formal security models for a generic k-RUA construction that guarantees user authenticity, anonymity and user privacy. We provide a concrete instantiation of k-RUA having the following properties: (1) a third party cannot impersonate an authorized user by producing valid transcripts for the user while conversing during a session; (2) a third party having access to the communication channel between the user and the authority cannot identify the session participants; (3) the authority can trace the real identities of dishonest users who have authenticated themselves for more than k times; (4) our k-RUA construction avoids using expensive pairing operations—which makes it efficient and suitable for devices having limited amount of computational resources. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4365 info:doi/10.1007/978-3-030-14234-6_36 https://ink.library.smu.edu.sg/context/sis_research/article/5368/viewcontent/46.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Anonymity K-times untraceability Remote user authentication User privacy Information Security Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Anonymity
K-times untraceability
Remote user authentication
User privacy
Information Security
Software Engineering
spellingShingle Anonymity
K-times untraceability
Remote user authentication
User privacy
Information Security
Software Engineering
TIAN, Yangguang
LI, Yingjiu
SENGUPTA, Binanda
DENG, Robert H.
CHING, Albert
LIU, Weiwei
Privacy-preserving remote user authentication with K-times untraceability
description Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where authorized users authenticate themselves to an authority (typically a server) in an anonymous and k-times untraceable manner. We define the formal security models for a generic k-RUA construction that guarantees user authenticity, anonymity and user privacy. We provide a concrete instantiation of k-RUA having the following properties: (1) a third party cannot impersonate an authorized user by producing valid transcripts for the user while conversing during a session; (2) a third party having access to the communication channel between the user and the authority cannot identify the session participants; (3) the authority can trace the real identities of dishonest users who have authenticated themselves for more than k times; (4) our k-RUA construction avoids using expensive pairing operations—which makes it efficient and suitable for devices having limited amount of computational resources.
format text
author TIAN, Yangguang
LI, Yingjiu
SENGUPTA, Binanda
DENG, Robert H.
CHING, Albert
LIU, Weiwei
author_facet TIAN, Yangguang
LI, Yingjiu
SENGUPTA, Binanda
DENG, Robert H.
CHING, Albert
LIU, Weiwei
author_sort TIAN, Yangguang
title Privacy-preserving remote user authentication with K-times untraceability
title_short Privacy-preserving remote user authentication with K-times untraceability
title_full Privacy-preserving remote user authentication with K-times untraceability
title_fullStr Privacy-preserving remote user authentication with K-times untraceability
title_full_unstemmed Privacy-preserving remote user authentication with K-times untraceability
title_sort privacy-preserving remote user authentication with k-times untraceability
publisher Institutional Knowledge at Singapore Management University
publishDate 2018
url https://ink.library.smu.edu.sg/sis_research/4365
https://ink.library.smu.edu.sg/context/sis_research/article/5368/viewcontent/46.pdf
_version_ 1770574687463538688