Investigating anonymity in group based anonymous authentication

N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we discuss anonymity in context of group based anonymous authentication (GBAA). Methods for GBAA provide mechanisms such that a user is able to prove membership in a group Uʹ ⊆ U of authorized users U to a verifier, whereas the verifier does not obtain any information on the actual identity of the authenticating user. They can be used in addition to anonymous communication channels in order to enhance user’s privacy if access to services is limited to authorized users, e.g. subscription-based services. We especially focus on attacks against the anonymity of authenticating users which can be mounted by an external adversary or a passive verifier when GBAA is treated as a black box. In particular, we investigate what an adversary can learn by solely observing anonymity sets Uʹ used for GBAA and how users can choose their anonymity sets in case of Uʹ ⊂ U. Based on the information which can be obtained by adversaries we show that the probability of user identification can be improved.

Cite

CITATION STYLE

APA

Slamanig, D., & Stingl, C. (2009). Investigating anonymity in group based anonymous authentication. In IFIP Advances in Information and Communication Technology (Vol. 298, pp. 268–281). Springer New York LLC. https://doi.org/10.1007/978-3-642-03315-5_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free