How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme

Access this Article

Author(s)

    • SHIN SeongHan
    • Information Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)
    • KOBARA Kazukuni
    • Information Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)

Abstract

<p>A purpose of password-based anonymous authentication schemes is to provide not only password-based authentication but also user anonymity. In [19], Yang et al., proposed a password-based anonymous authentication scheme (we call it YZWB10 scheme) using the password-protected credentials. In this paper, we discuss user anonymity of the YZWB10 scheme [19] against a third-party attacker, who is much weaker than a malicious server. First, we show that a third-party attacker in the YZWB10 scheme can specify which user actually sent the login request to the server. This attack also indicates that the attacker can link different login requests to be sent later by the same user. Second, we give an <i>effective</i> countermeasure to this attack which does not require any security for storing users' password-protected credentials.</p>

Journal

  • IEICE Transactions on Information and Systems

    IEICE Transactions on Information and Systems E101.D(3), 803-807, 2018

    The Institute of Electronics, Information and Communication Engineers

Codes

Page Top