A secure system for data access based on anonymous authentication and time-dependent hierarchical keys

Wen-Guey Tzeng*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Scopus citations

Abstract

We consider the security problem for retrieving data from a web site (or a large database system) via Internet. Consider the situation that a user visits a web site to get information. He wants to retain anonymity of his identity, while the web site would like to authenticate the user's identity. We proposed an anonymous authentication scheme to provide a solution for these two seemingly conflicting requirements. Our anonymous authentication scheme is based on cryptographic techniques. Together with a novel time-dependent hierarchical key assignment scheme, we proposed a data access system that has the following distinct features simultaneously: (1) anonymous authentication, (2) cryptographic access control, (3) saving on-line encryption time, and (4) a flexible subscription system.

Original languageEnglish
Title of host publicationProceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
Pages223-230
Number of pages8
DOIs
StatePublished - 1 Dec 2006
Event2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 - Taipei, Taiwan
Duration: 21 Mar 200724 Mar 2007

Publication series

NameProceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
Volume2006

Conference

Conference2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
CountryTaiwan
CityTaipei
Period21/03/0724/03/07

Keywords

  • Anonymous authentication
  • Entity security
  • Hierarchical keys
  • Trapdoor time-sharable sequence
  • World wide web security

Fingerprint Dive into the research topics of 'A secure system for data access based on anonymous authentication and time-dependent hierarchical keys'. Together they form a unique fingerprint.

  • Cite this

    Tzeng, W-G. (2006). A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 (pp. 223-230). (Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06; Vol. 2006). https://doi.org/10.1145/1128817.1128851