CFP last date
20 December 2024
Reseach Article

Smart Anonymous Authentication Protocol for E-Governance

by Akash Shirsath, Bhagyashree Bhujang, Karishma Sanap, Hemant D. Sonawavne
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 38
Year of Publication: 2019
Authors: Akash Shirsath, Bhagyashree Bhujang, Karishma Sanap, Hemant D. Sonawavne
10.5120/ijca2019918121

Akash Shirsath, Bhagyashree Bhujang, Karishma Sanap, Hemant D. Sonawavne . Smart Anonymous Authentication Protocol for E-Governance. International Journal of Computer Applications. 181, 38 ( Jan 2019), 1-3. DOI=10.5120/ijca2019918121

@article{ 10.5120/ijca2019918121,
author = { Akash Shirsath, Bhagyashree Bhujang, Karishma Sanap, Hemant D. Sonawavne },
title = { Smart Anonymous Authentication Protocol for E-Governance },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2019 },
volume = { 181 },
number = { 38 },
month = { Jan },
year = { 2019 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number38/30279-2019918121/ },
doi = { 10.5120/ijca2019918121 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:08:28.452030+05:30
%A Akash Shirsath
%A Bhagyashree Bhujang
%A Karishma Sanap
%A Hemant D. Sonawavne
%T Smart Anonymous Authentication Protocol for E-Governance
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 38
%P 1-3
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication services used many times a day. If there is no user authentication, then it would be impossible to use email accounts, discussion boards, e-banking or even electronic communication. On the other hand, It releases a lot of personal information during every authentication process. User login can be linked to used services and assets by service providers. The frequency of usage and therefore the map of our behavior on the Internet can be created to make more focused advertisement, to track us or even to steal our electronic identity. The purpose of this paper is to state the requirements and provide the initial design for an anonymous authentication scheme which prevents the leakage of private information. The new scheme, to be widely acceptable, must be beneficial for both users and service providers, who implement the authentication systems. Therefore the new authentication system must provide a feature for revealing dishonest users. These users can be eventually deanonymized and charged for damages.This paper provides such a responsibility-protecting feature in this new scheme.

References
  1. Bao, F. (2000). An efficient verifiable encryption schemefor encryption of discrete logarithms. In Schneier, B.and Quisquater, 1.-1., editors, Smart Card. Research and Applications, volume 1820 of Lecture Notes inComputer Science, pages 2 13-220. Springer.
  2. Bichsel, P., Camenisch, 1 GroB, T., and Shoup, V. (2009).Anonymous credentials on a standard java card. In Proceedings of the 16th ACM conference onCompute and communications security, CCS '09, pages 600--610, New York, NY, USA. ACM.
  3. Camenisch, 1. And Lysyanskaya, A. (2003). A signature scheme with efficient protocols. In Proceedings of the3rd international conference on Security in communicationnetworks, SCN'02, pages 268-289,Berlin,
  4. Heidelberg. Springer-Verlag.Camenisch, 1. And Stadler,M. (1997). Proof systems forGeneral statements about discrete logarithms. Technicalreport.
  5. Camenisch, 1. And Van Herreweghen, E. (2002). Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM conferenceon Computer and communications security, CCS '02, pages 2 1-30, New York, NY, USA. ACM.
  6. Dingledine, R., Mathewson, N., and Syverson, P. (2004).Tor: The second-generation onion router. In Proceedings of the 13 th Usenix Security Symposium.
  7. Lysyanskaya, A. (200 I). An efficient system fornontransferable anonymous credentials with optionalAnonymity revocation. Pages 93- 1 18. Springer.
  8. Schaffer, M. and Schartner, P. (2006). Anonymous authenticationwith optional shared anonymity revocation andlinkability. In Smart Card Research and AdvancedApplications, volume 3928 of Lecture Notes inComputerScience, pages 206-22 1. Springer Berlin / Heidelberg.
  9. Schnorr, C. P. (1991). Efficient signature generation bysmart cards. Journal of Cryptology, 4: 16 1- 174
Index Terms

Computer Science
Information Sciences

Keywords

Anonymity Privacy Authentication Efficiency Responsibility