Due to the privacy concerns prevailing in today’s computing environments, users are more likely to require anonymity or at least pseudonyms; on the other hand, they must be traceable or revokable in case of abuse. Meanwhile, an authorization mechanism that controls access rights of users to services or resources is frequently needed in various real-world applications but does not favor anonymity. To cope with these problems, we explore an anonymous authentication and authorization method that very efficiently supports fine-grained authorization services without losing strong but traceable anonymity. The efficiency of our method comes from atomizing authorization within a group and issuing multiple authorization values for a group membership. The cryptographic basis of our method is the famous short traceable signature scheme. Our method allows a user to selectively disclose authorization according to need and also provides revocation and update of authorization without revoking membership or anonymity. To prevent users from forging authorization, our method enables the users to prove their authorizations while hiding the corresponding authorization values from other users. We formally analyze security and compare the related methods in terms of efficiency and functionality. We show that our method is secure against misidentification, anonymity-break and framing attacks and is efficient within a reasonable bound while still providing various functionalities such as fine-grained authorization and authorization revocation, commonly required in many practical applications.
|Number of pages||19|
|Journal||International Journal of Information Security|
|Publication status||Published - 2014 Oct 1|
Bibliographical noteFunding Information:
This work was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2012R1A1B3000965). This work was also supported by the IT R&D program of MSIP/KEIT [No.10047212, Development of homomorphic encryption supporting arithmetics on ciphertexts of size less than 1kB and its applications].
© 2014, Springer-Verlag Berlin Heidelberg.
All Science Journal Classification (ASJC) codes
- Information Systems
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications