Affiliation:
1. University of Wollongong, Australia
2. Dartmouth College, Hanover, NH
3. Indiana University Bloomington, IN
Abstract
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful Trusted Third Parties (TTPs) capable of deanonymizing (or linking) users' connections. Such TTPs are undesirable because users' anonymity is not guaranteed, and users must trust them to judge misbehaviors fairly. Recent schemes such as
Blacklistable Anonymous Credentials (BLAC)
and
Enhanced Privacy ID (EPID)
support “privacy-enhanced revocation”— servers can revoke misbehaving users without a TTP's involvement, and without learning the revoked users' identities.
In BLAC and EPID, however, the computation required for authentication at the server is
linear in the size (L) of the revocation list
, which is impractical as the size approaches thousands of entries. We propose PEREA, a new anonymous authentication scheme for which this bottleneck computation is
independent of the size of the revocation list
. Instead, the time complexity of authentication is linear in the size of a
revocation window
K
≪
L
, the number of subsequent authentications before which a user's misbehavior must be recognized if the user is to be revoked. We extend PEREA to support more complex revocation policies that take the
severity
of misbehaviors into account. Users can authenticate anonymously if their
naughtiness
, i.e., the sum of the severities of their blacklisted misbehaviors, is below a certain naughtiness threshold. We call our extension PEREA-Naughtiness. We prove the security of our constructions, and validate their efficiency as compared to BLAC analytically and quantitatively.
Funder
Institute for Security Technology Studies
Division of Computer and Network Systems
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献