Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Linkable and traceable anonymous authentication with fine-grained access control

Published: 18 November 2024 Publication History

Abstract

To prevent misuse of privacy, numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities. Previous schemes cannot simultaneously achieve public linking and tracing while holding access control, therefore, a new tool named linkable and traceable anonymous authentication with fine-grained access control (LTAA-FGAC) is offered, which is designed to satisfy: (i) access control, i.e., only authorized users who meet a designated authentication policy are approved to authenticate messages; (ii) public linkability, i.e., anyone can tell whether two authentications with respect to a common identifier are created by an identical user; (iii) public traceability, i.e., everyone has the ability to deduce a double-authentication user’s identity from two linked authentications without the help of other parties. We formally define the basic security requirements for the new tool, and also give a generic construction so as to satisfy these requirements. Then, we present a formal security proof and an implementation of our proposed LTAA-FGAC scheme.

References

[1]
Liu J K and Wong D S On the security models of (threshold) ring signature schemes Proceedings of the 7th International Conference on Information Security and Cryptology 2005 204-217
[2]
Camenisch J and Stadler M Efficient group signature schemes for large groups Proceedings of the 17th Annual International Cryptology Conference 1997 410-424
[3]
Kumawat S and Paul S A new constant-size accountable ring signature scheme without random oracles Proceedings of the 13th International Conference on Information Security and Cryptology 2018 157-179
[4]
Libert B and Yung M Efficient traceable signatures in the standard model Theoretical Computer Science 2011 412 12–14 1220-1242
[5]
Hwang J Y, Chen L, Cho H S, and Nyang D Short dynamic group signature scheme supporting controllable linkability IEEE Transactions on Information Forensics and Security 2015 10 6 1109-1124
[6]
Boyen X and Haines T Forward-secure linkable ring signatures Proceedings of the 23rd Australasian Conference on Information Security and Privacy 2018 245-264
[7]
Lu Y, Tang Q, and Wang G ZebraLancer: private and anonymous crowdsourcing system atop open blockchain Proceedings of the 38th IEEE International Conference on Distributed Computing Systems 2018 853-865
[8]
Fujisaki E and Suzuki K Traceable ring signature Proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography 2007 181-200
[9]
Au M H, Susilo W, and Yiu S M Event-oriented k-times revocable-iff-linked group signatures Proceedings of the 11th Australasian Conference on Information Security and Privacy 2006 223-234
[10]
Wei V K Tracing-by-linking group signatures Proceedings of the 8th International Conference on Information Security 2005 149-163
[11]
Nguyen L and Safavi-Naini R Dynamic k-times anonymous authentication Proceedings of the 3rd International Conference on Applied Cryptography and Network Security 2005 318-333
[12]
Maji H K, Prabhakaran M, and Rosulek M Attribute-based signatures Proceedings of Cryptographers’ Track at the RSA Conference 2011 2011 376-392
[13]
Blömer J, Bobolz J, Diemert D, and Eidens F Updatable anonymous credentials and applications to incentive systems Proceedings of 2019 ACM SIGSAC Conference on Computer and Communications Security 2019 1671-1685
[14]
El Kaafarani A and Ghadafi E Attribute-based signatures with user-controlled linkability without random oracles Proceedings of the 16th IMA International Conference on Cryptography and Coding 2017 161-184
[15]
Gu K, Wang K, and Yang L Traceable attribute-based signature Journal of Information Security and Applications 2019 49 102400
[16]
Hébant C and Pointcheval D Traceable constant-size multi-authority credentials Proceedings of the 13th International Conference on Security and Cryptography for Networks 2022 411-434
[17]
Fiore D, Garms L, Kolonelos D, Soriente C, and Tucker I Ring signatures with user-controlled linkability Proceedings of the 27th European Symposium on Research in Computer Security 2022 405-426
[18]
Garms L and Lehmann A Group signatures with selective linkability Proceedings of the 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography 2019 190-220
[19]
Slamanig D, Spreitzer R, and Unterluggauer T Adding controllable linkability to pairing-based group signatures for free Proceedings of the 17th International Conference on Information Security 2014 388-400
[20]
Krenn S, Samelin K, and Striecks C Practical group-signatures with privacy-friendly openings Proceedings of the 14th International Conference on Availability, Reliability and Security 2019 10
[21]
Zheng H, Wu Q, Qin B, Zhong L, He S, and Liu J Linkable group signature for auditing anonymous communication Proceedings of the 23rd Australasian Conference on Information Security and Privacy 2018 304-321
[22]
Zhang X, Liu J K, Steinfeld R, Kuchta V, and Yu J Revocable and linkable ring signature Proceedings of the 15th International Conference on Information Security and Cryptology 2020 3-27
[23]
Au M H, Liu J K, Susilo W, and Yuen T H Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction Theoretical Computer Science 2013 469 1-14
[24]
Okamoto T and Takashima K Efficient attribute-based signatures for nonmonotone predicates in the standard model Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography 2011 35-52
[25]
Okamoto T and Takashima K Decentralized attribute-based signatures Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography 2013 125-142
[26]
Camenisch J, Drijvers M, Dzurenda P, and Hajny J Fast keyed-verification anonymous credentials on standard smart cards Proceedings of the 34th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection 2019 286-298
[27]
Tan S Y and Groß T Monipoly—an expressive q-SDH-based anonymous attribute-based credential system Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security 2020 498-526
[28]
Urquidi M, Khader D, Lancrenon J, and Chen L Attribute-based signatures with controllable linkability Proceedings of the 7th International Conference on Trusted Systems 2016 114-129
[29]
El Kaafarani A, Chen L, Ghadafi E, and Davenport J Attribute-based signatures with user-controlled linkability Proceedings of the 13th International Conference on Cryptology and Network Security 2014 256-269
[30]
Drăgan C C, Gardham D, and Manulis M Hierarchical attribute-based signatures Proceedings of the 17th International Conference on Cryptology and Network Security 2018 213-234
[31]
Wei J, Huang X, Hu X, and Liu W Revocable threshold attribute-based signature against signing key exposure Proceedings of the 11th International Conference on Information Security Practice and Experience 2015 316-330
[32]
Ding S, Zhao Y, and Liu Y Efficient traceable attribute-based signature Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2014 582-589
[33]
El Kaafarani A, Ghadafi E, and Khader D Decentralized traceable attribute-based signatures Proceedings of Cryptographer’s Track at the RSA Conference 2014 2014 327-348
[34]
Ghadafi E Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions Proceedings of Cryptographer’s Track at the RSA Conference 2015 2015 391-409
[35]
Ali S T and Amberker B B Attribute-based group signature without random oracles with attribute anonymity International Journal of Information and Computer Security 2014 6 2 109-132
[36]
Kuchta V, Sharma G, Sahu R A, and Markowitch O Generic framework for attribute-based group signature Proceedings of the 13th International Conference on Information Security Practice and Experience 2017 814-834
[37]
Kaaniche N and Laurent M Attribute-based signatures for supporting anonymous certification Proceedings of the 21st European Symposium on Research in Computer Security 2016 279-300
[38]
Kapadia A, Tsang P P, and Smith S W Attribute-based publishing with hidden credentials and hidden policies Proceedings of Network and Distributed System Security Symposium 2007 1-14
[39]
Zhang Y, Chen X, Li J, Wong D S, and Li H Anonymous attribute-based encryption supporting efficient decryption test Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security 2013 511-516
[40]
Li J, Ren K, Zhu B, and Wan Z Privacy-aware attribute-based encryption with user accountability Proceedings of the 12th International Conference on Information Security 2009 347-362
[41]
Lipmaa H Progression-free sets and sublinear pairing-based noninteractive zero-knowledge arguments Proceedings of the 9th Theory of Cryptography Conference on Theory of Cryptography 2012 169-189
[42]
Groth J and Maller M Snarky signatures: minimal signatures of knowledge from simulation-extractable SNARKs Proceedings of the 37th Annual International Cryptology Conference on Advances in Cryptology 2017 581-612
[43]
Guan Z, Wan Z, Yang Y, Zhou Y, and Huang B BlockMaze: an efficient privacy-preserving account-model blockchain based on zk-SNARKs IEEE Transactions on Dependable and Secure Computing 2022 19 3 1446-1463

Index Terms

  1. Linkable and traceable anonymous authentication with fine-grained access control
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Information & Contributors

              Information

              Published In

              cover image Frontiers of Computer Science: Selected Publications from Chinese Universities
              Frontiers of Computer Science: Selected Publications from Chinese Universities  Volume 19, Issue 2
              Feb 2025
              130 pages

              Publisher

              Springer-Verlag

              Berlin, Heidelberg

              Publication History

              Published: 18 November 2024
              Accepted: 31 July 2023
              Received: 19 March 2023

              Author Tags

              1. anonymous authentication
              2. access control
              3. public linkability
              4. public traceability

              Qualifiers

              • Research-article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • 0
                Total Citations
              • 0
                Total Downloads
              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 11 Feb 2025

              Other Metrics

              Citations

              View Options

              View options

              Figures

              Tables

              Media

              Share

              Share

              Share this Publication link

              Share on social media