PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use

Jan Hajny, Lukas Malina, Vaclav Zeman

2011

Abstract

We use authentication services many times a day. Without user authentication, it would be impossible to use e-mail accounts, discussion boards, e-banking or even electronic communication. On the other hand, we release a lot of personal information during every authentication process. Our login can be linked to used services and assets by service providers. The frequency of usage and therefore the map of our behaviour on the Internet can be created to make more focused advertisement, to track us or even to steal our electronic identity. The goal of this paper is to state the requirements and provide the initial design for an anonymous authentication scheme which prevents the leakage of private information. The new scheme, to be widely acceptable, must be beneficial for both users and service providers, who implement the authentication systems. Therefore we claim that the new authentication system must provide a feature for revealing dishonest users. These users can be eventually deanonymized and charged for damages. We provide such a responsibility-protecting feature in our scheme. We also compare our scheme design with current anonymous authentication schemes and provide initial performance results from our smart-card implementation.

Download


Paper Citation


in Harvard Style

Hajny J., Malina L. and Zeman V. (2011). PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 405-408. DOI: 10.5220/0003576404050408

in Bibtex Style

@conference{secrypt11,
author={Jan Hajny and Lukas Malina and Vaclav Zeman},
title={PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={405-408},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003576404050408},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use
SN - 978-989-8425-71-3
AU - Hajny J.
AU - Malina L.
AU - Zeman V.
PY - 2011
SP - 405
EP - 408
DO - 10.5220/0003576404050408