File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2897845.2897903
- Scopus: eid_2-s2.0-84979681521
- WOS: WOS:000390302800051
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Anonymous identification for ad hoc group
Title | Anonymous identification for ad hoc group |
---|---|
Authors | |
Keywords | Obfuscations Ad Hoc Group Anonymous Identification Cryptography |
Issue Date | 2016 |
Citation | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 583-591 How to Cite? |
Abstract | © 2016 Copyright held by the owner/author(s). An anonymous identification scheme for ad hoc group allows a participant to identify himself as a member of a group of users in a way that his actual identity is not revealed. We propose a highly efficient construction of this cryptographic primitive in the symmetric key setting based on the idea of program obfuscation. The salient feature of our scheme is that only hash evaluations are needed. Consequently, our scheme outperforms all existing constructions for a reasonably large ad hoc group size (of around 50000 users) since no exponentiation nor pairing operation is involved. Technically, the participant only needs to evaluate one hash operation to identify himself. While the time complexity of the verifier is linearly in the size of the ad hoc group, the actual running time is rather insignificant since the constant factor of this linear dependence is the time of a single hash evaluation. To analyse the security of our proposal, we develop a security model to capture the security requirements of this primitive and prove that our construction satisfies these requirements in the random oracle model against unbounded attackers. Similar to other identification schemes secure in the random oracle model, our proposed protocol requires only two message flow. |
Persistent Identifier | http://hdl.handle.net/10722/280592 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lu, Xingye | - |
dc.contributor.author | Au, Man Ho | - |
dc.date.accessioned | 2020-02-17T14:34:25Z | - |
dc.date.available | 2020-02-17T14:34:25Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 583-591 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280592 | - |
dc.description.abstract | © 2016 Copyright held by the owner/author(s). An anonymous identification scheme for ad hoc group allows a participant to identify himself as a member of a group of users in a way that his actual identity is not revealed. We propose a highly efficient construction of this cryptographic primitive in the symmetric key setting based on the idea of program obfuscation. The salient feature of our scheme is that only hash evaluations are needed. Consequently, our scheme outperforms all existing constructions for a reasonably large ad hoc group size (of around 50000 users) since no exponentiation nor pairing operation is involved. Technically, the participant only needs to evaluate one hash operation to identify himself. While the time complexity of the verifier is linearly in the size of the ad hoc group, the actual running time is rather insignificant since the constant factor of this linear dependence is the time of a single hash evaluation. To analyse the security of our proposal, we develop a security model to capture the security requirements of this primitive and prove that our construction satisfies these requirements in the random oracle model against unbounded attackers. Similar to other identification schemes secure in the random oracle model, our proposed protocol requires only two message flow. | - |
dc.language | eng | - |
dc.relation.ispartof | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | - |
dc.subject | Obfuscations | - |
dc.subject | Ad Hoc Group | - |
dc.subject | Anonymous Identification | - |
dc.subject | Cryptography | - |
dc.title | Anonymous identification for ad hoc group | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/2897845.2897903 | - |
dc.identifier.scopus | eid_2-s2.0-84979681521 | - |
dc.identifier.spage | 583 | - |
dc.identifier.epage | 591 | - |
dc.identifier.isi | WOS:000390302800051 | - |