Anonymous Authentication using Attribute-based Encryption
        - URL: http://arxiv.org/abs/2506.14566v1
 - Date: Tue, 17 Jun 2025 14:24:28 GMT
 - Title: Anonymous Authentication using Attribute-based Encryption
 - Authors: Nouha Oualha, 
 - Abstract summary: Attribute-Based Encryption (ABE) has emerged as a promising approach to privacy-preserving data protection.<n>This paper proposes an anonymous authentication mechanism based on ABE, which allows users to authenticate without revealing their identity.
 - Score: 0.0
 - License: http://creativecommons.org/licenses/by/4.0/
 - Abstract:   In today's digital age, personal data is constantly at risk of compromise. Attribute-Based Encryption (ABE) has emerged as a promising approach to privacy-preserving data protection. This paper proposes an anonymous authentication mechanism based on ABE, which allows users to authenticate without revealing their identity. The mechanism adds a privacy-preserving layer by enabling authorization based solely on user attributes. The proposed approach is implemented using OpenID Connect, demonstrating its feasibility in real-world systems. 
 
       
      
        Related papers
        - Triple-identity Authentication: The Future of Secure Access [0.0]
In a typical authentication process, the local system verifies the user's identity using a stored hash value generated by a cross-system hash algorithm.<n>This article shifts the research focus from traditional password encryption to the establishment of gatekeeping mechanisms for effective interactions between a system and the outside world.
arXiv  Detail & Related papers  (2025-05-04T06:18:59Z) - Privacy-Preserving Biometric Verification with Handwritten Random Digit   String [49.77172854374479]
Handwriting verification has stood as a steadfast identity authentication method for decades.<n>However, this technique risks potential privacy breaches due to the inclusion of personal information in handwritten biometrics such as signatures.<n>We propose using the Random Digit String (RDS) for privacy-preserving handwriting verification.
arXiv  Detail & Related papers  (2025-03-17T03:47:25Z) - Provisioning Time-Based Subscription in NDN: A Secure and Efficient   Access Control Scheme [21.55750158120826]
This paper proposes a novel encryption-based access control mechanism for Named Data Networking (NDN)<n>The scheme allows data producers to share their content in encrypted form before transmitting it to consumers.<n>It incorporates time-based subscription access policies directly into the encrypted content, enabling only consumers with valid subscriptions to decrypt it.
arXiv  Detail & Related papers  (2025-01-27T11:44:36Z) - iFADIT: Invertible Face Anonymization via Disentangled Identity   Transform [51.123936665445356]
Face anonymization aims to conceal the visual identity of a face to safeguard the individual's privacy.<n>This paper proposes a novel framework named iFADIT, an acronym for Invertible Face Anonymization via Disentangled Identity Transform.
arXiv  Detail & Related papers  (2025-01-08T10:08:09Z) - Towards an identity management solution on Arweave [0.0]
This paper explores the potential of using Arweave network to develop an identity management solution.<n>By harnessing Arweave's permanent storage, our solution offers users Self-Sovereign Identity (SSI) framework.
arXiv  Detail & Related papers  (2024-12-18T14:01:31Z) - Privacy-Enhanced Adaptive Authentication: User Profiling with Privacy   Guarantees [0.6554326244334866]
This paper introduces a novel privacy-enhanced adaptive authentication protocol.
It dynamically adjusts authentication requirements based on real-time risk assessments.
By adhering to data protection regulations such as CCPA, our protocol not only enhances security but also fosters user trust.
arXiv  Detail & Related papers  (2024-10-27T19:11:33Z) - Disentangle Before Anonymize: A Two-stage Framework for   Attribute-preserved and Occlusion-robust De-identification [55.741525129613535]
"Disentangle Before Anonymize" is a novel two-stage Framework(DBAF)<n>This framework includes a Contrastive Identity Disentanglement (CID) module and a Key-authorized Reversible Identity Anonymization (KRIA) module.<n>Extensive experiments demonstrate that our method outperforms state-of-the-art de-identification approaches.
arXiv  Detail & Related papers  (2023-11-15T08:59:02Z) - Blockchain-enabled Data Governance for Privacy-Preserved Sharing of   Confidential Data [1.6006586061577806]
We propose a blockchain-based data governance system that employs attribute-based encryption to prevent privacy leakage and credential misuse.
First, our ABE encryption system can handle multi-authority use cases while protecting identity privacy and hiding access policy.
Second, applying the Advanced Encryption Standard (AES) for data encryption makes the whole system efficient and responsive to real-world conditions.
arXiv  Detail & Related papers  (2023-09-08T05:01:59Z) - RiDDLE: Reversible and Diversified De-identification with Latent
  Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv  Detail & Related papers  (2023-03-09T11:03:52Z) - PASS: Protected Attribute Suppression System for Mitigating Bias in Face
  Recognition [55.858374644761525]
Face recognition networks encode information about sensitive attributes while being trained for identity classification.
Existing bias mitigation approaches require end-to-end training and are unable to achieve high verification accuracy.
We present a descriptors-based adversarial de-biasing approach called Protected Attribute Suppression System ( PASS)'
Pass can be trained on top of descriptors obtained from any previously trained high-performing network to classify identities and simultaneously reduce encoding of sensitive attributes.
arXiv  Detail & Related papers  (2021-08-09T00:39:22Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv  Detail & Related papers  (2020-03-15T12:45:10Z) 
        This list is automatically generated from the titles and abstracts of the papers in this site.
       
     
           This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.