Privacy-preserving remote user authentication with K-times untraceability
Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where authorized users authenticate themselves to an au...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2018
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4365 https://ink.library.smu.edu.sg/context/sis_research/article/5368/viewcontent/46.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5368 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-53682020-03-30T08:03:46Z Privacy-preserving remote user authentication with K-times untraceability TIAN, Yangguang LI, Yingjiu SENGUPTA, Binanda DENG, Robert H. CHING, Albert LIU, Weiwei Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where authorized users authenticate themselves to an authority (typically a server) in an anonymous and k-times untraceable manner. We define the formal security models for a generic k-RUA construction that guarantees user authenticity, anonymity and user privacy. We provide a concrete instantiation of k-RUA having the following properties: (1) a third party cannot impersonate an authorized user by producing valid transcripts for the user while conversing during a session; (2) a third party having access to the communication channel between the user and the authority cannot identify the session participants; (3) the authority can trace the real identities of dishonest users who have authenticated themselves for more than k times; (4) our k-RUA construction avoids using expensive pairing operations—which makes it efficient and suitable for devices having limited amount of computational resources. 2018-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4365 info:doi/10.1007/978-3-030-14234-6_36 https://ink.library.smu.edu.sg/context/sis_research/article/5368/viewcontent/46.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Anonymity K-times untraceability Remote user authentication User privacy Information Security Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Anonymity K-times untraceability Remote user authentication User privacy Information Security Software Engineering |
spellingShingle |
Anonymity K-times untraceability Remote user authentication User privacy Information Security Software Engineering TIAN, Yangguang LI, Yingjiu SENGUPTA, Binanda DENG, Robert H. CHING, Albert LIU, Weiwei Privacy-preserving remote user authentication with K-times untraceability |
description |
Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where authorized users authenticate themselves to an authority (typically a server) in an anonymous and k-times untraceable manner. We define the formal security models for a generic k-RUA construction that guarantees user authenticity, anonymity and user privacy. We provide a concrete instantiation of k-RUA having the following properties: (1) a third party cannot impersonate an authorized user by producing valid transcripts for the user while conversing during a session; (2) a third party having access to the communication channel between the user and the authority cannot identify the session participants; (3) the authority can trace the real identities of dishonest users who have authenticated themselves for more than k times; (4) our k-RUA construction avoids using expensive pairing operations—which makes it efficient and suitable for devices having limited amount of computational resources. |
format |
text |
author |
TIAN, Yangguang LI, Yingjiu SENGUPTA, Binanda DENG, Robert H. CHING, Albert LIU, Weiwei |
author_facet |
TIAN, Yangguang LI, Yingjiu SENGUPTA, Binanda DENG, Robert H. CHING, Albert LIU, Weiwei |
author_sort |
TIAN, Yangguang |
title |
Privacy-preserving remote user authentication with K-times untraceability |
title_short |
Privacy-preserving remote user authentication with K-times untraceability |
title_full |
Privacy-preserving remote user authentication with K-times untraceability |
title_fullStr |
Privacy-preserving remote user authentication with K-times untraceability |
title_full_unstemmed |
Privacy-preserving remote user authentication with K-times untraceability |
title_sort |
privacy-preserving remote user authentication with k-times untraceability |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2018 |
url |
https://ink.library.smu.edu.sg/sis_research/4365 https://ink.library.smu.edu.sg/context/sis_research/article/5368/viewcontent/46.pdf |
_version_ |
1770574687463538688 |