Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.4.11

A Study on Anonymous Authorization based on Short Group Signatures  

Shin, Soo-Yeon (Department of Computer Science, Sejong University)
Kwon, Tae-Kyoung (Department of Computer Science, Sejong University)
Abstract
The existing anonymous authentication schemes based on group signatures for protecting privacy do not provide anonymous authorization which is required in the practical environments. In this paper, we propose an anonymous authentication and authorization scheme that enables a service provider both to authenticate anonymously its users and to provide different service according to their authorization. In the proposed scheme, a user's real identity, anonymity and authorization are managed distinctly through the separation of group manager's capabilities and an authorization authority. It is also possible for the proposed scheme to apply various access control models.
Keywords
privacy preservation; anonymous authentication; anonymous authorization; fine-grained authorization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Nguyen and R. Safavi-Naini, "Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings," In Proc. of Asiacrypt 2004, LNCS 3329, Springer-Verlag, pp. 372-386, 2004.
2 D. Yao and R. Tamassia, "Compact and Anonymous Role-Based Authorization Chain," ACM Trans. on Information and System Security (TISSEC), Vol. 12, No. 3, 2009.
3 D. Boneh, X. Boyen and H. Shacham, "Short group signatures," In Proc. of Crypyo 2004, LNCS 3152, Springer-Verlag, pp. 41-55, 2004.
4 J. Camenisch, "Efficient and generalized group signatures," In Proc. of Eurocrypt 1997, LNCS 1233, Springer-Verlag, pp. 465-479, 1997.
5 J. Camenisch and M. Stadler, "Efficient group signature schemes for large groups," In Proc. of Crypto 1997, LNCS, 1296, Springer-Verlag, 1997.
6 J. Camenisch and M. Stadler, "Efficient group signature schemes for large groups," In Proc. of Crypto 1997, LNCS, 1296, Springer-Verlag, 1997.
7 D. Chaum and E. van Heyst, "Group signatures," In Proc. of Eurocrypt 1991, LNCS 547, Springer-Verlag, pp. 257-265, 1991.
8 L. Chen and T. P. Pederson, "New group signature schemes," In Proc. of Eurocrypt 1994, LNCS 950, Springer-Verlag, pp. 171-181, 1994.
9 S. G. Choi, K. Park, and M. Yung, "Short traceable signatures based on bilinear pairings," In Proc. of IWSEC 2006, LNCS 4266, Springer-Verlag, pp. 88-103, 2006.
10 A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable Signatures," In Proc. of Eurocrypt 2004, LNCS 3027, Springe-Verlag, pp. 571-589, 2004.
11 A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," In Proc. of SAC 1999, LNCS 1758, Springer-Verlag, pp. 184-199, 1999.
12 G. Ateniese, J. Camenisch, M. Joye and G. Tsudik "A practical and provably secure coalition-resistant group signature scheme," In Proc. of Crypto 2000, LNCS 1880, Springer-Verlag, pp. 255-270, 2000.
13 D. Boneh and X. Boyen, "Short Signatures Without Random Oracles," In Proc. of Eurocrypt 2004, LNCS 3027, Springer-Verlag, pp. 56-73, 2004.
14 V. Benjumea, Choi Seung G., J. Lopez and M. Yung, "Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication," In Proc. of CANS 2007, LNCS 4856, Springer-Verlag, pp. 265-281, 2007.