A New Anonymous Ring Authenticated Key Exchange Protocol

Due to the growing importance in the fields of computer networks, how to keep user's privacy has drawn more and more concerns in recent years. In this paper, based on a ring signature scheme, we propose a new secure anonymous authenticated key exchange protocol, which inherits all the good virtues of the previous protocols. Furthermore, we discuss the security attributes of our new scheme. Finally, we give an extension of our new scheme's application and make a conclusion of this paper. Index Terms—ring signature, anonymous authentication, key exchange I. INTRODUCTION Due to the growing importance in the application of computer networks (1), authentication supporting key exchange has been widely used to protect resources from illegal access. However, traditional authentication schemes supporting key exchange require that the identity of the user should be explicitly specified to facilitate authentication and further key exchange, which may violate the user's privacy in some privacy-sensitive applications, such as online drug stores. In order to solve such seemingly paradoxical issue, many schemes have been proposed, and in this paper we also give a sheme to solve such problem.

[1]  Cheng-Chi Lee,et al.  A password authentication scheme over insecure networks , 2006, J. Comput. Syst. Sci..

[2]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[3]  Mohan S. Kankanhalli,et al.  Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[4]  Lei Li,et al.  A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme , 2003, ACNS.

[5]  Xiaofeng Chen,et al.  Ring Authenticated Encryption: A New Type of Authenticated Encryption , 2004 .

[6]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[7]  Aggelos Kiayias,et al.  Anonymous Identification in Ad Hoc Groups , 2004, EUROCRYPT.

[8]  Hung-Yu Chien,et al.  A remote authentication scheme preserving user anonymity , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[9]  Jing Yang,et al.  A New Anonymous Password-Based Authenticated Key Exchange Protocol , 2008, INDOCRYPT.

[10]  Zhenfu Cao,et al.  Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy , 2006, WASA.

[11]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[12]  Hidema Tanaka,et al.  Anonymous Password-Based Authenticated Key Exchange , 2005, INDOCRYPT.

[13]  Arjan Durresi,et al.  Anonymous communications in the Internet , 2007, Cluster Computing.