A pairing based cryptographic anonymous authentication scheme

  • Authors:
  • Saba Jalal;Brian King

  • Affiliations:
  • Indiana Univ. Purdue Univ. Indianapolis;Indiana Univ. Purdue Univ. Indianapolis

  • Venue:
  • Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Privacy and authenticity are two critical aspects of security. Our goal is to construct a protocol using pairing based cryptography that provides all of the necessary security properties, as well as make the protocol compliant to as many applications/problem domains as possible. Some motivating applications for an anonymous authentication protocol are E-commerce, E-voting, E-library, E-cash, as well as some medical applications, and mobile agent applications. Typically there are three parties involved, the user, servers, and the trusted third party TTP. Each entity in the system registers with the TTP only once. In our design we construct a fully anonymous pairing based authentication scheme, which allows each user to authenticates themselves to a server without requiring the identity of the user to be revealed. Further, in order to to deal with malicious users, we provide the TTP the capability to track malicious users.