Anonymous Authentication with Shared Secrets View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015-03-29

AUTHORS

Joël Alwen , Martin Hirt , Ueli Maurer , Arpita Patra , Pavel Raykov

ABSTRACT

Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system.In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of [Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of [BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them. More... »

PAGES

219-236

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_12

DOI

http://dx.doi.org/10.1007/978-3-319-16295-9_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1037801626


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Alwen", 
        "givenName": "Jo\u00ebl", 
        "id": "sg:person.012071501373.41", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012071501373.41"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hirt", 
        "givenName": "Martin", 
        "id": "sg:person.010611500757.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010611500757.30"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maurer", 
        "givenName": "Ueli", 
        "id": "sg:person.01316567627.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India", 
          "id": "http://www.grid.ac/institutes/grid.34980.36", 
          "name": [
            "Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Patra", 
        "givenName": "Arpita", 
        "id": "sg:person.016570701367.19", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016570701367.19"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Raykov", 
        "givenName": "Pavel", 
        "id": "sg:person.013532555573.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013532555573.04"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2015-03-29", 
    "datePublishedReg": "2015-03-29", 
    "description": "Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system.In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of\u00a0[Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of\u00a0[BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.", 
    "editor": [
      {
        "familyName": "Aranha", 
        "givenName": "Diego F.", 
        "type": "Person"
      }, 
      {
        "familyName": "Menezes", 
        "givenName": "Alfred", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-16295-9_12", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-16294-2", 
        "978-3-319-16295-9"
      ], 
      "name": "Progress in Cryptology - LATINCRYPT 2014", 
      "type": "Book"
    }, 
    "keywords": [
      "message authentication code", 
      "constructive cryptography framework", 
      "high-level context", 
      "legitimate parties", 
      "anonymous authentication", 
      "constructive cryptography", 
      "entity authentication", 
      "encryption scheme", 
      "authentication code", 
      "privacy concerns", 
      "security goals", 
      "middle adversary", 
      "identity of parties", 
      "discernible information", 
      "anonymity", 
      "authentication", 
      "active entities", 
      "specific applications", 
      "cryptography", 
      "applications", 
      "adversary", 
      "authenticity", 
      "information", 
      "eavesdropping", 
      "system", 
      "messages", 
      "parties", 
      "secrets", 
      "code", 
      "communication", 
      "scheme", 
      "framework", 
      "simple protocol", 
      "key", 
      "tags", 
      "new type", 
      "protocol", 
      "entities", 
      "wide range", 
      "goal", 
      "behalf", 
      "work", 
      "context", 
      "step", 
      "one", 
      "hand", 
      "time", 
      "concern", 
      "statements", 
      "conflict", 
      "respect", 
      "identity", 
      "types", 
      "range", 
      "presence", 
      "active men", 
      "men", 
      "approach"
    ], 
    "name": "Anonymous Authentication with Shared Secrets", 
    "pagination": "219-236", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1037801626"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-16295-9_12"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-16295-9_12", 
      "https://app.dimensions.ai/details/publication/pub.1037801626"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:46", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_368.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-16295-9_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_12'


 

This table displays all metadata directly associated to this object as RDF triples.

154 TRIPLES      23 PREDICATES      83 URIs      76 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-16295-9_12 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N01983a33209f42c89f3ca38af81f509d
4 schema:datePublished 2015-03-29
5 schema:datePublishedReg 2015-03-29
6 schema:description Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system.In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of [Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of [BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.
7 schema:editor N2cacd0b68e5d4d16a011773bd4646859
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N2ae121e7c6024a82ad9c978de5e19cf0
12 schema:keywords active entities
13 active men
14 adversary
15 anonymity
16 anonymous authentication
17 applications
18 approach
19 authentication
20 authentication code
21 authenticity
22 behalf
23 code
24 communication
25 concern
26 conflict
27 constructive cryptography
28 constructive cryptography framework
29 context
30 cryptography
31 discernible information
32 eavesdropping
33 encryption scheme
34 entities
35 entity authentication
36 framework
37 goal
38 hand
39 high-level context
40 identity
41 identity of parties
42 information
43 key
44 legitimate parties
45 men
46 message authentication code
47 messages
48 middle adversary
49 new type
50 one
51 parties
52 presence
53 privacy concerns
54 protocol
55 range
56 respect
57 scheme
58 secrets
59 security goals
60 simple protocol
61 specific applications
62 statements
63 step
64 system
65 tags
66 time
67 types
68 wide range
69 work
70 schema:name Anonymous Authentication with Shared Secrets
71 schema:pagination 219-236
72 schema:productId N574062b98d8a412abf84d31076e94ac0
73 N6218fc60935e47fd834c0b24bc83c4e4
74 schema:publisher N0f19418eff154ec68b37de556456dd88
75 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037801626
76 https://doi.org/10.1007/978-3-319-16295-9_12
77 schema:sdDatePublished 2022-05-20T07:46
78 schema:sdLicense https://scigraph.springernature.com/explorer/license/
79 schema:sdPublisher N531f72e4aea146fab274c6dbd41abcc4
80 schema:url https://doi.org/10.1007/978-3-319-16295-9_12
81 sgo:license sg:explorer/license/
82 sgo:sdDataset chapters
83 rdf:type schema:Chapter
84 N01983a33209f42c89f3ca38af81f509d rdf:first sg:person.012071501373.41
85 rdf:rest Nc85edf133f35408ea02c484251370efa
86 N0f19418eff154ec68b37de556456dd88 schema:name Springer Nature
87 rdf:type schema:Organisation
88 N2ae121e7c6024a82ad9c978de5e19cf0 schema:isbn 978-3-319-16294-2
89 978-3-319-16295-9
90 schema:name Progress in Cryptology - LATINCRYPT 2014
91 rdf:type schema:Book
92 N2cacd0b68e5d4d16a011773bd4646859 rdf:first N3e699ad554f64ad89cee4218f1b5c5fe
93 rdf:rest N44adf2db90f04e0f82247a849e26d0a0
94 N3e699ad554f64ad89cee4218f1b5c5fe schema:familyName Aranha
95 schema:givenName Diego F.
96 rdf:type schema:Person
97 N44adf2db90f04e0f82247a849e26d0a0 rdf:first Nc94650ac462f4b25a0337606626d1bc1
98 rdf:rest rdf:nil
99 N531f72e4aea146fab274c6dbd41abcc4 schema:name Springer Nature - SN SciGraph project
100 rdf:type schema:Organization
101 N574062b98d8a412abf84d31076e94ac0 schema:name dimensions_id
102 schema:value pub.1037801626
103 rdf:type schema:PropertyValue
104 N6218fc60935e47fd834c0b24bc83c4e4 schema:name doi
105 schema:value 10.1007/978-3-319-16295-9_12
106 rdf:type schema:PropertyValue
107 Na0e861a209034c1f8a87481693454cb8 rdf:first sg:person.01316567627.91
108 rdf:rest Nbddc789aa5654c07911a30bbb8d2a5a2
109 Nbddc789aa5654c07911a30bbb8d2a5a2 rdf:first sg:person.016570701367.19
110 rdf:rest Nd94cb3c94b1c4f1289a0152469630dce
111 Nc85edf133f35408ea02c484251370efa rdf:first sg:person.010611500757.30
112 rdf:rest Na0e861a209034c1f8a87481693454cb8
113 Nc94650ac462f4b25a0337606626d1bc1 schema:familyName Menezes
114 schema:givenName Alfred
115 rdf:type schema:Person
116 Nd94cb3c94b1c4f1289a0152469630dce rdf:first sg:person.013532555573.04
117 rdf:rest rdf:nil
118 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
119 schema:name Information and Computing Sciences
120 rdf:type schema:DefinedTerm
121 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
122 schema:name Data Format
123 rdf:type schema:DefinedTerm
124 sg:person.010611500757.30 schema:affiliation grid-institutes:grid.5801.c
125 schema:familyName Hirt
126 schema:givenName Martin
127 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010611500757.30
128 rdf:type schema:Person
129 sg:person.012071501373.41 schema:affiliation grid-institutes:grid.5801.c
130 schema:familyName Alwen
131 schema:givenName Joël
132 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012071501373.41
133 rdf:type schema:Person
134 sg:person.01316567627.91 schema:affiliation grid-institutes:grid.5801.c
135 schema:familyName Maurer
136 schema:givenName Ueli
137 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91
138 rdf:type schema:Person
139 sg:person.013532555573.04 schema:affiliation grid-institutes:grid.5801.c
140 schema:familyName Raykov
141 schema:givenName Pavel
142 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013532555573.04
143 rdf:type schema:Person
144 sg:person.016570701367.19 schema:affiliation grid-institutes:grid.34980.36
145 schema:familyName Patra
146 schema:givenName Arpita
147 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016570701367.19
148 rdf:type schema:Person
149 grid-institutes:grid.34980.36 schema:alternateName Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India
150 schema:name Department of Computer Science and Automation, Indian Institute of Science, Bangalore, India
151 rdf:type schema:Organization
152 grid-institutes:grid.5801.c schema:alternateName Department of Computer Science, ETH Zurich, Zürich, Switzerland
153 schema:name Department of Computer Science, ETH Zurich, Zürich, Switzerland
154 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...