2020
DOI: 10.1109/tifs.2019.2919926
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Single Sign-On With Proxy Re-Verification

Abstract: An anonymous Single Sign-on (ASSO) scheme allows users to access multiple services anonymously using one credential. We propose a new ASSO scheme, where users can access services anonymously through the use of anonymous credentials and unlinkably through the provision of designated verifiers. Notably, verifiers cannot link a user's service requests even if they collude. The novelty is that when a designated verifier is unavailable, a central authority can authorise new verifiers to authenticate the user on beh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 39 publications
(64 reference statements)
0
6
0
Order By: Relevance
“…Anonymous SSO was proposed for the global system for mobile (GSM) communications [40], and the notion of anonymous SSO was formalized [41]. Privacy-preserving primitives, such as group signature, zero-knowledge proof, Chebyshev Chaotic Maps and proxy re-verification, etc., were adopted to design anonymous SSO systems [41][42][43][44]. Anonymous SSO schemes work for special applications, but are unapplicable to lots of systems that require user identification for customized services.…”
Section: Extended Related Workmentioning
confidence: 99%
“…Anonymous SSO was proposed for the global system for mobile (GSM) communications [40], and the notion of anonymous SSO was formalized [41]. Privacy-preserving primitives, such as group signature, zero-knowledge proof, Chebyshev Chaotic Maps and proxy re-verification, etc., were adopted to design anonymous SSO systems [41][42][43][44]. Anonymous SSO schemes work for special applications, but are unapplicable to lots of systems that require user identification for customized services.…”
Section: Extended Related Workmentioning
confidence: 99%
“…Pseudonym has been applied in some schemes [20,24] to protect users' privacy. To reduce the communication cost of traditional pseudonym systems in Internet of Vehicles, Kang et al [24] proposed a privacy-preserved pseudonym scheme.…”
Section: Related Workmentioning
confidence: 99%
“…In [20], Han et al proposed an anonymous single sign-on (ASSO) scheme. In this scheme, pseudonym was applied to protect users' identities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The report was developed as part of an EPSRC project 1 that focused on Data to Improve the Customer Experience (DICE). The project's main application domain was intelligent transport systems (ITS) but the scope included ensuring security and data privacy when using web services, for example in the case of smart ticketing [4] and emerging technologies [5] that could be applicable in the ITS domain. In this report and that associated GitHub we make reference to the authenticator that we developed as a DICEkey.…”
Section: Introductionmentioning
confidence: 99%