Search
Close this search box.

Linkable and traceable anonymous authentication with fine-grained access

Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user’s identity in a privacy-preserving way. If enough privacy is provided, malicious users may misuse privacy. Accountability is necessary to avoid abusing anonymity. Previous anonymous authentication schemes can not hold the basic requirements of public linking and tracing while further ensuring access control simultaneously.

image

Credit: Peng LI, Junzuo LAI, Dehua ZHOU, Lianguan HUANG, Meng SUN, Wei WU, Ye YANG

Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user’s identity in a privacy-preserving way. If enough privacy is provided, malicious users may misuse privacy. Accountability is necessary to avoid abusing anonymity. Previous anonymous authentication schemes can not hold the basic requirements of public linking and tracing while further ensuring access control simultaneously.

To address the problems, a research team led by Junzuo Lai published their new research on 12 Mar 2024 in Frontiers of Computer Science co-published by Higher Education Press and Springer Nature.

The team proposed a linkable and traceable anonymous authentication with fine-grained access control, supporting access control, anonymity, public linkability and public traceability at the same time. The proposed scheme does not need a trusted authority to detect malicious behaviors. Anyone is able to judge whether a user authenticates multiple times or not, and further find its identity. A formal security proof and the experiment data show the efficiency and feasibility of the proposed scheme.

Future work can focus on expanding the scheme to a multi-authority scheme, allowing each authority to issue an attribute key corresponding to a certain attribute to a user.

DOI: 10.1007/s11704-023-3225-3