Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

Abstract : Affiliation-Hiding Authentication (AHA) protocols have the seemingly contradictory property of enabling users to authenticate each other as members of certain groups, without revealing their affiliation to group outsiders. Of particular interest in practice is the group-discovering variant, which handles multiple group memberships per user. Corresponding solutions were only recently introduced, and have two major drawbacks: high bandwidth consumption (typically several kilobits per user and affiliation), and only moderate performance in scenarios of practical application.While prior protocols have O(n2) time complexity, where n denotes the number of affiliations per user, we introduce a new AHA protocol running in O(nlogn) time. In addition, the bandwidth consumed is considerably reduced. We consider these advances a major step towards deployment of privacy-preserving methods in constraint devices, like mobile phones, to which the economization of these resources is priceless.
Type de document :
Communication dans un congrès
Claudio A. Ardagna; Jianying Zhou. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-6633, pp.85-99, 2011, Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication. 〈10.1007/978-3-642-21040-2_6〉
Liste complète des métadonnées

Littérature citée [29 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01573294
Contributeur : Hal Ifip <>
Soumis le : mercredi 9 août 2017 - 10:24:19
Dernière modification le : mercredi 9 août 2017 - 10:25:13

Fichier

978-3-642-21040-2_6_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Mark Manulis, Bertram Poettering. Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. Claudio A. Ardagna; Jianying Zhou. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-6633, pp.85-99, 2011, Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication. 〈10.1007/978-3-642-21040-2_6〉. 〈hal-01573294〉

Partager

Métriques

Consultations de la notice

101

Téléchargements de fichiers

13