2006
DOI: 10.1007/11957454_19
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Key-Trees for Tree-Based Private Authentication

Abstract: Abstract. Key-tree based private authentication has been proposed by Molnar and Wagner as a neat way to efficiently solve the problem of privacy preserving authentication based on symmetric key cryptography. However, in the key-tree based approach, the level of privacy provided by the system to its members may decrease considerably if some members are compromised. In this paper, we analyze this problem, and show that careful design of the tree can help to minimize this loss of privacy. First, we introduce a be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(38 citation statements)
references
References 9 publications
0
38
0
Order By: Relevance
“…We will refer to such trees as "Buttyán trees", and to trees with a constant branching factor as "Classic trees". Buttyán et al in [4] reach the conclusion that the branching factors near the root contribute more toS and R. For trees with variable branching factors this means that a deep, top heavy Buttyán tree can potentially outperform a shallow classic tree.…”
Section: Buttyán Treesmentioning
confidence: 97%
See 3 more Smart Citations
“…We will refer to such trees as "Buttyán trees", and to trees with a constant branching factor as "Classic trees". Buttyán et al in [4] reach the conclusion that the branching factors near the root contribute more toS and R. For trees with variable branching factors this means that a deep, top heavy Buttyán tree can potentially outperform a shallow classic tree.…”
Section: Buttyán Treesmentioning
confidence: 97%
“…A paper of particular interest is by Buttyán et al [4], where the concept of trees with variable branching factors is introduced, to better preserve anonymity in case of attack. Our work provides an optimization of Buttyán's solution.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Solutions based on the use of pseudonyms -anonymized versions of the static identifiers -present the drawback of needing an exhaustive search in the back-end database [5]. However, our approach does not suffer from this disadvantage, since we have the advantage of knowing in advance which specific tags (i.e.…”
Section: Security Performance and Cost Analysismentioning
confidence: 99%