You are here

PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users

TitlePEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
Publication TypeJournal Article
Year of Publication2011
AuthorsAu, MH, Tsang, PP, Kapadia, A
JournalACM Transactions on Information and System Security ({ACM TISSEC})
Volume14
Pagination29:1–29:34
Date Published12/2011
ISSN1094-9224
Keywordsanonymous authentication, anonymous blacklisting, privacy, privacy-enhanced revocation, user misbehavior
Abstract

Several anonymous authentication schemes allow servers to revoke a misbehaving user’s future accesses.
Traditionally, these schemes have relied on powerful Trusted Third Parties (TTPs) capable of deanonymizing
(or linking) users’ connections. Such TTPs are undesirable because users’ anonymity is not guaranteed, and users must trust them to judge ‘misbehavior’ fairly. Recent schemes such as Blacklistable Anonymous Credentials (BLAC) and Enhanced Privacy ID (EPID) support “privacy-enhanced revocation” — servers can revoke misbehaving users without a TTP’s involvement, and without learning the revoked users’ identities.
In BLAC and EPID, however, the computation required for authentication at the server is linear in the size (L) of the revocation list, which is impractical as the size approaches thousands of entries. We propose PEREA, a new anonymous authentication scheme for which this bottleneck of computation is independent of the size of the revocation list. Instead, the time complexity of authentication is linear in the size of a revocation window K L, the number of subsequent authentications before which a user’s misbehavior must be recognized if the user is to be revoked. We extend PEREA to support more complex revocation policies that take the severity of misbehaviors into account. Users can authenticate anonymously if their naughtiness, i.e., the sum of the severities of their blacklisted misbehaviors, is below a certain naughtiness threshold.
We call our extension PEREA-Naughtiness. We prove the security of our constructions, and validate their efficiency as compared to BLAC both analytically and quantitatively.

URLhttp://doi.acm.org/10.1145/2043628.2043630
DOI10.1145/2043628.2043630
AttachmentSize
PDF icon TISSEC - PEREA.pdf960.56 KB