TY - GEN

T1 - k-Times Anonymous Authentication with a constant proving cost

AU - Teranishi, Isamu

AU - Sako, Kazue

N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.

PY - 2006

Y1 - 2006

N2 - A k-Times Anonymous Authentication (k-TAA) scheme allows users to be authenticated anonymously so long as the number of times that they are authenticated is within an allowable number. Some promising applications are e-voting, e-cash, e-coupons, and trial browsing of contents. However, the previous schemes are not efficient in the case where the allowable number k is large, since they require both users and verifiers to compute O(k) exponentiation in each authentication. We propose a k-TAA scheme where the numbers of exponentiations required for the entities in an authentication are independent of k. Moreover, we propose a notion of public detectability in a k-TAA scheme and present an efficient publicly verifiable k-TAA scheme, where the number of modular exponentiations required for the entities is O(log(k)).

AB - A k-Times Anonymous Authentication (k-TAA) scheme allows users to be authenticated anonymously so long as the number of times that they are authenticated is within an allowable number. Some promising applications are e-voting, e-cash, e-coupons, and trial browsing of contents. However, the previous schemes are not efficient in the case where the allowable number k is large, since they require both users and verifiers to compute O(k) exponentiation in each authentication. We propose a k-TAA scheme where the numbers of exponentiations required for the entities in an authentication are independent of k. Moreover, we propose a notion of public detectability in a k-TAA scheme and present an efficient publicly verifiable k-TAA scheme, where the number of modular exponentiations required for the entities is O(log(k)).

KW - Efficiency

KW - K-times anonymous authentication

KW - Public verifiability

UR - http://www.scopus.com/inward/record.url?scp=33745871113&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745871113&partnerID=8YFLogxK

U2 - 10.1007/11745853_34

DO - 10.1007/11745853_34

M3 - Conference contribution

AN - SCOPUS:33745871113

SN - 3540338519

SN - 9783540338512

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 525

EP - 542

BT - Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings

T2 - 9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006

Y2 - 24 April 2006 through 26 April 2006

ER -