PIRに基づく匿名認証とその応用

Translated title of the contribution: Anonymous Authentication Based on PIR and Its Applications

中村, 徹, 稲永, 俊介, 池田, 大輔, 馬場, 謙介, 安浦, 寛人, Toru NAKAMURA

Research output: Contribution to journalMisc

Abstract

This paper focuses on authentication with three types of entities: a user who sends an authentication request, an service provider who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents an authentication protocol which satisfies the following important properties: (1) Anonymity against Database, (2) Password Protection, and (3) Security against Replay Attacks, with a Private Information Retrieval (PIR) scheme.
Translated title of the contributionAnonymous Authentication Based on PIR and Its Applications
Original languageJapanese
Pages (from-to)1 - 6
Journalコンピュータセキュリティシンポジウム
Volume2009
StatePublished - 12 Oct 2011

Fingerprint

Dive into the research topics of 'Anonymous Authentication Based on PIR and Its Applications'. Together they form a unique fingerprint.

Cite this