DOI QR코드

DOI QR Code

A Study on Anonymous Authorization based on Short Group Signatures

짧은 그룹 서명 기법 기반의 익명 인가에 대한 연구

  • 신수연 (세종대학교 컴퓨터공학과) ;
  • 권태경 (세종대학교 컴퓨터공학과)
  • Received : 2010.11.08
  • Accepted : 2011.03.15
  • Published : 2011.08.31

Abstract

The existing anonymous authentication schemes based on group signatures for protecting privacy do not provide anonymous authorization which is required in the practical environments. In this paper, we propose an anonymous authentication and authorization scheme that enables a service provider both to authenticate anonymously its users and to provide different service according to their authorization. In the proposed scheme, a user's real identity, anonymity and authorization are managed distinctly through the separation of group manager's capabilities and an authorization authority. It is also possible for the proposed scheme to apply various access control models.

프라이버시 보호를 위한 그룹 서명 기법에 기반한 기존의 익명 인증 기법은 실제 응용 환경에서 필요로 하는 익명인가는 제공하지 못한다. 이를 해결하기 위해서 본 논문에서는 짧은 그룹 서명 기법에 기반하여 익명 인증과 동시에 익명 인가를 통해 사용자에게 권한별 서비스 제공이 가능한 익명 인증 및 인가 기법을 제안한다. 익명 인증 및 인가 기법은 그룹 매니저의 권한 분할과 권한 매니저를 이용하여, 실명, 익명, 권한이 모두 분리 관리 되도록 하며, 다양한 접근제어 모델의 적용이 가능하다.

Keywords

Acknowledgement

Supported by : 한국연구재단

References

  1. G. Ateniese, J. Camenisch, M. Joye and G. Tsudik "A practical and provably secure coalition-resistant group signature scheme," In Proc. of Crypto 2000, LNCS 1880, Springer-Verlag, pp. 255-270, 2000.
  2. V. Benjumea, Choi Seung G., J. Lopez and M. Yung, "Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication," In Proc. of CANS 2007, LNCS 4856, Springer-Verlag, pp. 265-281, 2007.
  3. D. Boneh and X. Boyen, "Short Signatures Without Random Oracles," In Proc. of Eurocrypt 2004, LNCS 3027, Springer-Verlag, pp. 56-73, 2004.
  4. D. Boneh, X. Boyen and H. Shacham, "Short group signatures," In Proc. of Crypyo 2004, LNCS 3152, Springer-Verlag, pp. 41-55, 2004.
  5. J. Camenisch, "Efficient and generalized group signatures," In Proc. of Eurocrypt 1997, LNCS 1233, Springer-Verlag, pp. 465-479, 1997.
  6. J. Camenisch and M. Stadler, "Efficient group signature schemes for large groups," In Proc. of Crypto 1997, LNCS, 1296, Springer-Verlag, 1997.
  7. J. Camenisch and M. Stadler, "Efficient group signature schemes for large groups," In Proc. of Crypto 1997, LNCS, 1296, Springer-Verlag, 1997.
  8. D. Chaum and E. van Heyst, "Group signatures," In Proc. of Eurocrypt 1991, LNCS 547, Springer-Verlag, pp. 257-265, 1991.
  9. L. Chen and T. P. Pederson, "New group signature schemes," In Proc. of Eurocrypt 1994, LNCS 950, Springer-Verlag, pp. 171-181, 1994.
  10. S. G. Choi, K. Park, and M. Yung, "Short traceable signatures based on bilinear pairings," In Proc. of IWSEC 2006, LNCS 4266, Springer-Verlag, pp. 88-103, 2006.
  11. A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable Signatures," In Proc. of Eurocrypt 2004, LNCS 3027, Springe-Verlag, pp. 571-589, 2004.
  12. A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," In Proc. of SAC 1999, LNCS 1758, Springer-Verlag, pp. 184-199, 1999.
  13. L. Nguyen and R. Safavi-Naini, "Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings," In Proc. of Asiacrypt 2004, LNCS 3329, Springer-Verlag, pp. 372-386, 2004.
  14. D. Yao and R. Tamassia, "Compact and Anonymous Role-Based Authorization Chain," ACM Trans. on Information and System Security (TISSEC), Vol. 12, No. 3, 2009.