Advertisement

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices

  • Yanjiang YangEmail author
  • Xuhua Ding
  • Haibing Lu
  • Jian Weng
  • Jianying Zhou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7807)

Abstract

We are witnessing the rapid expansion of smart devices in our daily life. The need for individual privacy protection calls for anonymous entity authentication techniques with affordable efficiency upon the resource-constrained smart devices. Towards this objective, in this paper we propose self-blindable credential, a lightweight anonymous entity authentication primitive. We provide a formulation of the primitive and present two concrete instantiations.

Keywords

Signature Scheme Smart Device Credential Scheme Public Parameter Signature Verification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

The fourth author was supported by the National Science Foundation of China under Grant No. 61373158, and the Fok Ying Tung Education Foundation under Grant No. 131066.

References

  1. 1.
    Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111–125. Springer, Heidelberg (2006) CrossRefGoogle Scholar
  2. 2.
    Balasch, J.: Smart Card Implementation of Anonymous Credentials, Master thesis. K.U, Leuven (2008)Google Scholar
  3. 3.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  4. 4.
    Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  5. 5.
    Bichsel, P., Camenisch, J., Gro\(\beta \), T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the ACM Conference on Computer and Communication Security, CCS 2009, pp. 600–610 (2009)Google Scholar
  6. 6.
    Batina, L., Hoepman, J.-H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 209–222. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  7. 7.
    Baldimtsi, F., Lysyanskaya, A.: Anonymous Credentials Light. http://eprint.iacr.org/2012/298.pdf
  8. 8.
    Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Proceedings of the ACM conference on Computer and Communications Security, CCS 2004, pp. 168–177 (2004)Google Scholar
  9. 9.
    Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the ACM Conference on Computer and Communication Security, CCS 2002 (2002)Google Scholar
  10. 10.
    Camenisch, J., Lysyanskaya, A.: An efficient sysem for non-transferable anonymous credentials with optional anonymity revocation. In: Proceedings of the Advances in Cryptology, Eurocrypt 2001, pp. 93–118 (2001)Google Scholar
  11. 11.
    Camenisch, J.L., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003) CrossRefGoogle Scholar
  12. 12.
    Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481–500. Springer, Heidelberg (2009) CrossRefGoogle Scholar
  13. 13.
    Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275–292. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  14. 14.
    Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, T.: Efficient implementation of anonymous credentials on java card smart cards. In: Proceedings of the Information Forensics and Security, WIFS 2009, pp. 106–110. IEEE (2009)Google Scholar
  15. 15.
    Verheul, E.R.: Self-blindable credential certificates from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 533. Springer, Heidelberg (2001) CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Yanjiang Yang
    • 1
    Email author
  • Xuhua Ding
    • 2
  • Haibing Lu
    • 3
  • Jian Weng
    • 4
  • Jianying Zhou
    • 1
  1. 1.Institute for Infocomm ResearchSingaporeSingapore
  2. 2.School of Information SystemsSingapore Management UniversitySingaporeSingapore
  3. 3.The Leavey School of BusinessSanta Clara UniversitySanta ClaraUSA
  4. 4.Department of Computer ScienceJinan UniversityGuangzhouChina

Personalised recommendations