{"title":"基于非交互证明的全局身份去中心化多权威匿名认证","authors":"Hiroaki Anada","doi":"10.1109/SMARTCOMP.2019.00024","DOIUrl":null,"url":null,"abstract":"We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. When a prover wants authorities to issue private attribute certificates, the authorities simply generate digital signatures on her global identity string. We give two security definitions; resistance against collusion attacks that cause misauthentication, and anonymity for privacy protection. Then we give a concrete construction by employing the structure-preserving signature scheme and the Groth-Sahai non-interactive proof system, the both of which are based on bilinear groups. We give security proofs in the standard model, which reduce to the security of the building blocks.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs\",\"authors\":\"Hiroaki Anada\",\"doi\":\"10.1109/SMARTCOMP.2019.00024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. When a prover wants authorities to issue private attribute certificates, the authorities simply generate digital signatures on her global identity string. We give two security definitions; resistance against collusion attacks that cause misauthentication, and anonymity for privacy protection. Then we give a concrete construction by employing the structure-preserving signature scheme and the Groth-Sahai non-interactive proof system, the both of which are based on bilinear groups. We give security proofs in the standard model, which reduce to the security of the building blocks.\",\"PeriodicalId\":253364,\"journal\":{\"name\":\"2019 IEEE International Conference on Smart Computing (SMARTCOMP)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Smart Computing (SMARTCOMP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SMARTCOMP.2019.00024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMARTCOMP.2019.00024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. When a prover wants authorities to issue private attribute certificates, the authorities simply generate digital signatures on her global identity string. We give two security definitions; resistance against collusion attacks that cause misauthentication, and anonymity for privacy protection. Then we give a concrete construction by employing the structure-preserving signature scheme and the Groth-Sahai non-interactive proof system, the both of which are based on bilinear groups. We give security proofs in the standard model, which reduce to the security of the building blocks.