Yale University Department of Computer Science Deniable Anonymous Group Authentication

نویسندگان

  • Ewa Syta
  • Benjamin Peterson
  • David Isaac Wolinsky
  • Michael Fischer
  • Bryan Ford
چکیده

In some situations, users need to authenticate as distinct members of some welldefined group, without revealing their individual identities: to validate and corroborate a leak, for example, or to count participants in a closed anonymous forum. Current group authentication techniques offering this capability, however, may de-anonymize users if an attacker later compromises their private keys. Addressing this under-explored risk, we present deniable anonymous group authentication (DAGA), the first anonymous authentication protocol offering proportionality, forward anonymity, and deniability in combination. To offer these properties, DAGA leverages a federation of collectively (but not individually) trusted servers. These servers collectively generate tags during authentication, which ensure client distinctness and proportionality, while cryptographically scrubbing information that could later de-anonymize clients. After an authentication round, clients and (honest) servers securely erase their ephemeral secrets, protecting clients from later de-anonymization even if an attacker eventually compromises all long-term client and server keys. A proof-of-concept prototype validates DAGA’s practicality, authenticating a client into a 32-member group in one second, or into a 2048-member group in two minutes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fully Deniable Message Authentication Protocols Preserving Confidentiality

1Department of Computer Science Electrical Engineering, University of Missouri-Kansas City, Kansas City, MO 64110, USA 2Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 62102, Taiwan 3Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fujian 350007, P. R. China 4Department of Information Engineering and Computer Scienc...

متن کامل

Anonymous Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks

This paper analyzes Chun et al.’s e-voting protocol for mobile ad-hoc network and modifies it based on blind signature technique to support anonymous voting property. Based on this property the trusted node cannot learn who has voted for whom. As the previous protocol, the modified protocol does not need any centralized administration. We analyze security and computation cost of the proposed pr...

متن کامل

Non-interactive Deniable Ring Authentication

In this paper, we propose a new primitive called non interactive deniable ring authentication: it is possible to convince a verifier that a member of an ad hoc collection of participants is authenticating a message m without revealing which one and the verifier V cannot convince any third party that the message m was indeed authenticated in a non-interactive way. Unlike the deniable ring authen...

متن کامل

Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings

Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot prove the source to a third party. In recent years, many deniable authentication protocols have been put forth. To adapt to some special group communication requirements, in this paper, we will propose a new group oriente...

متن کامل

A simple deniable authentication protocol based on the Diffie-Hellman algorithm

Deniable authentication protocol is a new authentication mechanism in secure computer communication, which not only enables an intended receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. In this paper, based on the Diffie-Hellman algorithm, we propose a new simple deniable authentication protocol from a provably secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015