Private Authentication: Optimal Information Theoretic Schemes

01/17/2019
by   Narges Kazempour, et al.
0

The main security service in the connected world of cyber physical systems necessitates to authenticate a large number of nodes privately. In this paper, the private authentication problem is considered, that consists of a certificate authority, a verifier, many legitimate users (prover) and any arbitrary number of illegitimate users. Each legitimate user wants to be authenticated by the verifier, while simultaneously wants to stay completely anonymous (even to the verifier and the CA). On the other hand, an illegitimate user must fail to authenticate himself. We analyze this problem from an information theoretical perspective. First, we propose a general interactive information-theoretic model for the problem. Then, we consider the problem in two different setups: finite size setup (i.e., the variables are elements of a finite field) and asymptotic setup (i.e., the variables are considered to have large enough length). For both setups, we propose optimal schemes that satisfy the completeness, soundness and privacy properties optimally. In finite field scheme, the idea is to generate the authentication keys according to a secret sharing scheme. In asymptotic scheme, we use a random binning based scheme which relies on the joint typicality to generate the authentication keys.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/12/2022

Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

Public key authentication (PKA) has been deployed in various services to...
research
04/04/2018

Controllable Identifier Measurements for Private Authentication with Secret Keys

The problem of secret-key based authentication under a privacy constrain...
research
04/24/2022

Information Theoretic Secure Aggregation with Uncoded Groupwise Keys

Secure aggregation, which is a core component of federated learning, agg...
research
07/08/2023

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

Containerization allows bundling applications and their dependencies int...
research
04/29/2021

Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication

Context-based authentication is a method for transparently validating an...
research
02/20/2021

Design of Ciphers based on the Geometric Structure of the Möbius Plane

Till now geometric structures don't play a major role in cryptography. G...

Please sign up or login with your details

Forgot password? Click here to reset