NEC Develops World's Most Efficient Privacy Preserving Authentication Scheme

Jul 22, 2005

NEC Corporation announced that it has developed the world's most efficient privacy preserving authentication scheme (or group signature scheme ) in terms of signature length and computational complexity, social infrastructure vital to both the privacy protection of individuals and security within a networked society.

Group signature schemes have been long sought after as they are believed to fulfill security and privacy needs simultaneously, i.e. they enable authorization of a user, without identifying the user, thus allowing the user a certain amount of anonymity. It is believed that these schemes may be applied to many systems in the future in which user anonymity is required such as in anonymous credential systems, and video/book rental systems, among others.

The main characteristics of a privacy preserving authentication scheme are:

(1) Enables verification of individuals belonging to a limited group who have authorized access, without actually identifying the user by an ID or personal name etc, reducing the risk of information leaks and protecting the hoarding of surplus personal information.
(2) Identification of the authenticated individual is only allowed by special authorities (specified administrators). As a result, disorderly and unjust use of anonymity is prevented as these authorities can revoke anonymity.


NEC's authentication scheme realizes the world's shortest authentication data length through the development of a new, original algorithm. Moreover, it has been verified as highly secure while simultaneously carrying out efficient creation and verification of authentication data by the world's most efficient computational complexity realized by the adoption of cryptographic protocol technology. Early group signature schemes/authentication schemes required large computational cost and long signature lengths; however, NEC's technological breakthrough enables shorter signature lengths at minimum cost.

Anonymous authentication schemes may enable, for example, a credit card transaction system with reduced risk of personal information leaks. This is mainly because a usual credit card transaction can be carried out at a retail premises by verifying that a user has an official contract with a certain credit card company, without providing the information terminal in the retail premises with the card no. or personal information of the user, however, the credit card company itself (administrator) can identify the holder of the credit card making the payment.

Essentially, information is hidden from certain parties, who should not have access to the information. This kind of technology can also be applied to loan systems such as those in video shops or libraries to protect the privacy of the borrower.

NEC's newly developed group signature scheme enables the world's most efficient signature length and computational complexity, proving security, and bringing the technology one more step closer to business model application. NEC believes that this technology will act as basic technology for next-generation solutions. This new breakthrough has proven the basic functions of the algorithm, and the next step for NEC is to verify practicality.

This development will provide NEC with the opportunity to apply its research-level group signature technology to a real business model application here forth.

Explore further: Turkey still hopes Twitter will open local office

add to favorites email to friend print save as pdf

Related Stories

Shape Security develops world's first "botwall"

Jan 23, 2014

(Phys.org) —Newly created company Shape Security has announced new technology aimed at combating botnets. Called the ShapeShifter, the product helps protect website owners against website breaches, most s ...

Joyriders make a black market of prestige Twitter handles

Mar 06, 2014

Joyriding – stealing a car just for the fun of it – is a signature act of troublemaking teenagers seeking excitement and a chance to show off their bravado. But while car theft is among the most common adolescent crimes, joyriding has a very 20th century feel to it. It is a physical crime involv ...

Space Station sensor to capture 'striking' lightning data

Mar 04, 2014

Keeping a spare on hand simply makes sense. Just as drivers keep spare tires on hand to replace a flat or blowout, NASA routinely maintains "spares," too. These flight hardware backups allow NASA to seamlessly ...

Fighting the rise of the app attackers

Feb 26, 2014

Researchers have been given a share of £3 million by the Engineering and Physical Sciences Research Council (EPSRC) to counter cyber-criminals who are using malicious apps which can collude with each other to infect the ...

Big chill sets in as RHIC physics heats up

Feb 04, 2014

If you think it's been cold outside this winter, that's nothing compared to the deep freeze setting in at the Relativistic Heavy Ion Collider (RHIC), the early-universe-recreating "atom smasher" at the U.S. ...

Recommended for you

Hand out money with my mobile? I think I'm ready

2 hours ago

A service is soon to launch in the UK that will enable us to transfer money to other people using just their name and mobile number. Paym is being hailed as a revolution in banking because you can pay peopl ...

User comments : 0

More news stories

Turning off depression in the brain

Scientists have traced vulnerability to depression-like behaviors in mice to out-of-balance electrical activity inside neurons of the brain's reward circuit and experimentally reversed it – but there's ...

There's something ancient in the icebox

Glaciers are commonly thought to work like a belt sander. As they move over the land they scrape off everything—vegetation, soil, and even the top layer of bedrock. So scientists were greatly surprised ...