Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Shinsaku KIYOMOTO, Kazuhide FUKUSHIMA, Toshiaki TANAKA, "Design of Anonymous Attribute Authentication Mechanism" in IEICE TRANSACTIONS on Communications,
vol. E92-B, no. 4, pp. 1112-1118, April 2009, doi: 10.1587/transcom.E92.B.1112.
Abstract: Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E92.B.1112/_p
Copy
@ARTICLE{e92-b_4_1112,
author={Shinsaku KIYOMOTO, Kazuhide FUKUSHIMA, Toshiaki TANAKA, },
journal={IEICE TRANSACTIONS on Communications},
title={Design of Anonymous Attribute Authentication Mechanism},
year={2009},
volume={E92-B},
number={4},
pages={1112-1118},
abstract={Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.},
keywords={},
doi={10.1587/transcom.E92.B.1112},
ISSN={1745-1345},
month={April},}
Copy
TY - JOUR
TI - Design of Anonymous Attribute Authentication Mechanism
T2 - IEICE TRANSACTIONS on Communications
SP - 1112
EP - 1118
AU - Shinsaku KIYOMOTO
AU - Kazuhide FUKUSHIMA
AU - Toshiaki TANAKA
PY - 2009
DO - 10.1587/transcom.E92.B.1112
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E92-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 2009
AB - Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication. In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.
ER -