Certified Pseudonyms Colligated with Master Secret Key
نویسندگان
چکیده
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.
منابع مشابه
On Dynamic Threshold Schemes
An (m, n) threshold scheme is to decompose the master key K into n secret shadows in such a way that the master key K cannot be reclaimed unless any m shadows are collected. However, any m 1 or fewer shadows provide absolutely no information about K. In 1989, Laih et al. proposed the concept of dynamic threshold schemes which allow the master key to be updated without changing the secret shadow...
متن کاملSecret Sharing in Graph-Based Prohibited Structures
A secret sharing scheme for the prohibited structure is a method of sharing a master key among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the master key. A secret sharing scheme is called perfect if any subset of participants who cannot recover the master key obtains no information regarding the master key. In this paper, we...
متن کاملAn Light-weight Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks
Due to the characters of vehicular ad hoc networks, to protect the privacy of the vehicles, the message must be anonymously transmitted in VANETs. However, the existing technologies to realize anonymity, pseudonyms certificate and group-oriented signature, have complex key management and large computational cost. They don’t satisfy actual demand. To solve the above problem, we propose a novel p...
متن کاملAn Enhanced Remote Authentication Scheme using Secure Key Exchange Protocol with Platform Integrity Attestation
Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce are dependent on remote authentication schem...
متن کاملDoS Attacks on RFID Systems: Privacy vs. Performance
In this chapter, we discuss the impact of providing tag privacy on the performance of an RFID system, in particular the complexity of identifying the tags being queried at the backend server. A common technique to provide tag privacy is to use pseudonyms. That is, for each authentication session, a tag uses a temporary and random-looking identifier so that it is infeasible for attackers to rela...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009