Local Alcoholics Anonymous and Narcotics Anonymous Meeting ...
Anonymous Authentication in Group 2001. 9. 11. Course Title: Network Security Faculty : Kwangjo Kim...
-
Upload
edmund-nicholson -
Category
Documents
-
view
213 -
download
1
Transcript of Anonymous Authentication in Group 2001. 9. 11. Course Title: Network Security Faculty : Kwangjo Kim...
Anonymous Authentication in Group
2001. 9. 11.
Course Title: Network SecurityFaculty : Kwangjo Kim
2001027 Jongseong Kim
2Network Security
1. MOTIVATION
▣ In many parts of crypto applications - internet bidding and auction,
electronic voting, lottery, peer to peer communication,.. – an anonymous
authentication protocol is needed to keep the identity of members secret.
▣ I will present protocol for authenticating a member in a group which is
less computational and faster than existent authentication protocols.
▣ If I finish my work successfully, I’ll get some knowledge about general
cryptography, digital signature, hash function, hash chain and so on.
3Network Security
2. REQUIREMENT
▣ Essential requirements Security
Anonymity
Unlinkablity
▣ Additional requirements
Management of membership in group
Authentication key management in group
4Network Security
3. OBJECTIVE
▣ Less Computational protocol
▣ Faster than current protocols
▣ Easy to implementation
5Network Security
4. APPROACH
▣ Eliminate flaw of group signature
▣ Minimize using the public-key cryptosystem to achieve proper speed
▣ Apply a hash function and hash chain to managing group members
6Network Security
5.TIME SCHEDULE
Time Table
Work3
th
4
th
5
th
6
th
7
th
8
th
9
th10th
11th
12th
13th
14th
15th
Survey related
Work
Improve protocol
mid-term
presentation
Complete protocols
Final report
7Network Security
6. REFERENCES
[1] Menezes, “Handbook of Applied Cryptography”
[2] Dan Boneh, Matt Franklin. “Anonymous Authentication with subset Queries” Proceedings of the 6th ACM conference on Computer and communications security November 1 - 4, 1999, Singapore
[3] Stuart Schechter , Todd Parnell , Alexander Hartemink, “Anonymous authentica- tion of Membership in Dynamic Groups”, Volume 1648, Issue , pp 0184-Lecture Notes in Computer Science
[4] David Chaum , Eugene vanHeyst, ”Group Signatures”,Volume 0547, Issue , pp 0257- lecture Notes in Computer Science
[5] Michel Abdalla , Sara Miner , Chanathip Namprempre, “Forward-Secure Threshold Signature Schemes”,Volume 2020, Issue , pp 0441- Lecture Notes in Computer Science
[6] Michel Abdalla , Sara Miner , Chanathip Namprempre, “Forward-Secure Threshold Signature Schemes”, Volume 2020, Issue , pp 0441-Lecture Notes in Computer Science