Abstract
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an service provider who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents an authentication protocol which satisfies the following important properties: (1) Anonymity against Database, (2) Password Protection, and (3) Security against Replay Attacks, with a Private Information Retrieval (PIR) scheme.
| Translated title of the contribution | Anonymous Authentication Based on PIR and Its Applications |
|---|---|
| Original language | Japanese |
| Pages (from-to) | 1 - 6 |
| Journal | コンピュータセキュリティシンポジウム |
| Volume | 2009 |
| State | Published - 12 Oct 2011 |