Anonymous Authentication in Group 2001. 9. 11. Course Title: Network Security Faculty : Kwangjo Kim 2001027 Jongseong Kim.

Slides:



Advertisements
Similar presentations
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Advertisements

Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
Broadcast Encryption and Traitor Tracing Jin Kim.
Network Security Term Project 2002 Fall Network Security Chul Joon Choi Prof. Kwang jo Kim Network Security Term Project (2002 Fall) 발표자 :
CIS/TCOM 551 Computer and Network Security Slide Set 1 Carl A. Gunter Spring 2004.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
CMSC 414 Computer (and Network) Security Lecture 15 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 15 Jonathan Katz.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
CSCI 398 Research Topics in Computer Science Yana Kortsarts Computer Science Department Widener University Chester, PA.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Discrete Mathematics. - Coding Theory and Cryptology - Cryptographic Implementations eindhoven.cr.yp.to - Discrete Algebra and Geometry.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
The Early Days of RSA -- History and Lessons Ronald L. Rivest MIT Lab for Computer Science ACM Turing Award Lecture.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
E-Commerce Course Overview. Telephone Network Connection-based Admission control Intelligence is “in the network” Traffic carried by relatively few, “well-known”,
CRYPTOGRAPHY How does it impact cyber security and why you need to know more?
Topic 22: Digital Schemes (2)
Midterm Review Cryptography & Network Security
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Multicast Security: A Taxonomy and Some Efficient Constructions By Cannetti et al, appeared in INFOCOMM 99. Presenter: Ankur Gupta.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
On the (Im)possibility of Blind Message Authentication Codes Gregory Neven (Katholieke Universiteit Leuven, Belgium) Joint work with: Michel Abdalla (Ecole.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Tempus – DEUKS Doctoral School towards European Knowledge Society Mathematical Institute Serbian Academy of Sciences and Arts Belgrade Udine, May 6-9,
Mohammad Alauthman 1/22/20162 This 3-credit first course for computer science & IT majors, which provides students the basic understanding.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Study on Cryptographic Application for Smart Card Course Title : Computer Security & E-Payment System Faculty : 김 광 조 김 종 승
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Study on The Secure Key-Evolving Protocols Kim Joong Man
Information Security at Florida State University
Efficient CRT-Based RSA Cryptosystems
TRUST: Security Education Program at Stanford
Security for Distributed Computer Systems
Cryptography Reference: Network Security
On the (Im)possibility of Blind Message Authentication Codes
Presentation transcript:

Anonymous Authentication in Group Course Title: Network Security Faculty : Kwangjo Kim Jongseong Kim

Network Security 2 1. MOTIVATION ▣ In many parts of crypto applications - internet bidding and auction, electronic voting, lottery, peer to peer communication,.. – an anonymous authentication protocol is needed to keep the identity of members secret. ▣ I will present protocol for authenticating a member in a group which is less computational and faster than existent authentication protocols. ▣ If I finish my work successfully, I’ll get some knowledge about general cryptography, digital signature, hash function, hash chain and so on.

Network Security 3 2. REQUIREMENT ▣ Essential requirements Security Anonymity Unlinkablity ▣ Additional requirements Management of membership in group Authentication key management in group

Network Security 4 3. OBJECTIVE ▣ Less Computational protocol ▣ Faster than current protocols ▣ Easy to implementation

Network Security 5 4. APPROACH ▣ Eliminate flaw of group signature ▣ Minimize using the public-key cryptosystem to achieve proper speed ▣ Apply a hash function and hash chain to managing group members

Network Security 6 5.TIME SCHEDULE Time Table Work 3 th 4 th 5 th 6 th 7 th 8 th 9 th 10 th 11 th 12 th 13 th 14 th 15 th Survey related Work Improve protocol mid-term presentation Complete protocols Final report

Network Security 7 6. REFERENCES [1] Menezes, “Handbook of Applied Cryptography” [2] Dan Boneh, Matt Franklin. “Anonymous Authentication with subset Queries” Proceedings of the 6th ACM conference on Computer and communications security November 1 - 4, 1999, Singapore [3] Stuart Schechter, Todd Parnell, Alexander Hartemink, “Anonymous authentica- tion of Membership in Dynamic Groups”, Volume 1648, Issue, pp Lecture Notes in Computer Science [4] David Chaum, Eugene vanHeyst, ”Group Signatures”, Volume 0547, Issue, pp lecture Notes in Computer Science [5] Michel Abdalla, Sara Miner, Chanathip Namprempre, “Forward-Secure Threshold Signature Schemes”, Volume 2020, Issue, pp Lecture Notes in Computer Science [6] Michel Abdalla, Sara Miner, Chanathip Namprempre, “Forward-Secure Threshold Signature Schemes”, Volume 2020, Issue, pp 0441-Lecture Notes in Computer Science