Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

نویسندگان

  • Mark Manulis
  • Bertram Poettering
چکیده

Affiliation-Hiding Authentication (AHA) protocols have the seemingly contradictory property of enabling users to authenticate each other as members of certain groups, without revealing their affiliation to group outsiders. Of particular interest in practice is the group-discovering variant, which handles multiple group memberships per user. Corresponding solutions were only recently introduced, and have two major drawbacks: high bandwidth consumption (typically several kilobits per user and affiliation), and only moderate performance in scenarios of practical application. While prior protocols have O(n) time complexity, where n denotes the number of affiliations per user, we introduce a new AHA protocol running in O(n log n) time. In addition, the bandwidth consumed is considerably reduced. We consider these advances a major step towards deployment of privacy-preserving methods in constraint devices, like mobile phones, to which the economization of these resources is priceless.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange

Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before actual authentication. In contrast, an AffiliationHiding Authentication Protocol, also called a Secret Handshake, allows two parties with certificates issued by the same organization to authenticate each other in a pr...

متن کامل

Chapter 3 Data Hiding in Medical

The art of data hiding has been gaining rapid growth and importance due to the ever increasing need for prevention methods against tampering, illegal copyright productions, optimal use of available bandwidth for data transmission and reception, authentication etc., Tele diagnosis and tele medicine has at the same time been growing in leaps and bounds with the advancements in technology and the ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement

Privacy concerns in many aspects of electronic communication trigger the need to re-examine – with privacy in mind – familiar security services, such as authentication and key agreement. An Affiliation-Hiding Group Key Agreement (AH-AGKA) protocol (also known as Group Secret Handshake) allows a set of participants, each with a certificate issued by the same authority, to establish a common auth...

متن کامل

The E ect of Limited Network Bandwidth and its Utilization

This paper addresses the use of two latency hiding techniques, prefetching and weak consistency, for large-scale shared memory multiprocessors with compiler-controlled cache coherence management and the interaction of latency hiding techniques and network bandwidth. The performance eeect of latency hiding is evaluated and compared varying the network channel bandwidth. The interaction of reads,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011