Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes

Nasima Begum, Toru Nakanishi, Yasuyuki Nogami

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

An anonymous credential system allows a user to convince a service provider anonymously that he/she owns certified attributes. Previously, an anonymous credential system was proposed to prove user's attributes to satisfy a monotone formula, i.e., a logic relation with any combination of AND/OR relations. However, this system has a problem of requiring large authentication time which depends on the number of attributes in the proved formula. In this paper, we propose methods to accelerate the authentication time by reducing the exponentiation costs for the calculations of accumulator and the witness which are used in the system. We implemented the accelerated system using a fast pairing library, and measured the authentication times, while changing the size of the proved relation.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages376-377
Number of pages2
ISBN (Print)9781479987443
DOIs
Publication statusPublished - Aug 20 2015
Event2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015 - Taipei, Taiwan, Province of China
Duration: Jun 6 2015Jun 8 2015

Other

Other2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
Country/TerritoryTaiwan, Province of China
CityTaipei
Period6/6/156/8/15

Keywords

  • Acceleration
  • Authentication
  • Communication networks
  • Libraries
  • Privacy
  • Size measurement
  • Velocity measurement

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Instrumentation
  • Media Technology

Fingerprint

Dive into the research topics of 'Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes'. Together they form a unique fingerprint.

Cite this