{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:40:47Z","timestamp":1755693647629,"version":"3.37.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00917-w","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T02:52:02Z","timestamp":1731293522000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Information-theoretic privacy-preserving user authentication"],"prefix":"10.1007","volume":"24","author":[{"given":"Narges","family":"Kazempour","sequence":"first","affiliation":[]},{"given":"Mahtab","family":"Mirmohseni","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,11]]},"reference":[{"key":"917_CR1","doi-asserted-by":"publisher","unstructured":"Kazempour, N., Mirmohseni, M., Aref, M.R.: Private authentication: Optimal information theoretic schemes. In: 2019 IEEE Information Theory Workshop, ITW 2019, IEEE, pp 1\u20135 (2019) https:\/\/doi.org\/10.1109\/ITW44776.2019.8989293","DOI":"10.1109\/ITW44776.2019.8989293"},{"key":"917_CR2","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology. Version v0 31:15 (2008)"},{"key":"917_CR3","doi-asserted-by":"publisher","unstructured":"Alexiou, N., Lagan\u00e0, M., Gisdakis, S., Khodaei, M., Papadimitratos, P.: Vespa: Vehicular security and privacy-preserving architecture. In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy, ACM, pp 19\u201324 (2013) https:\/\/doi.org\/10.1145\/2463183.2463189","DOI":"10.1145\/2463183.2463189"},{"issue":"10","key":"917_CR4","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., L\u00f3pez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266\u20132279 (2013). https:\/\/doi.org\/10.1016\/j.comnet.2012.12.018","journal-title":"Comput. Netw."},{"key":"917_CR5","unstructured":"Van\u00a0Saberhagen, N.: Cryptonote v 2.0 (2013)"},{"key":"917_CR6","doi-asserted-by":"publisher","first-page":"98986","DOI":"10.1109\/ACCESS.2020.2997840","volume":"8","author":"Yanji Jiang","year":"2020","unstructured":"Jiang, Yanji, Ge, Shaocheng, Shen, Xueli: AAAS: an anonymous authentication scheme based on group signature in VANETs. IEEE Access 8, 98986\u201398998 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2997840","journal-title":"IEEE Access"},{"issue":"4","key":"917_CR7","doi-asserted-by":"publisher","first-page":"e14917","DOI":"10.1016\/j.heliyon.2023.e14917","volume":"9","author":"Simin Chen","year":"2023","unstructured":"Chen, Simin, Chen, Jiageng: Lattice-based group signatures with forward security for anonymous authentication. Heliyon 9(4), e14917 (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e14917","journal-title":"Heliyon"},{"issue":"10","key":"917_CR8","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s12652-021-03459-4","volume":"13","author":"AD Dwivedi","year":"2022","unstructured":"Dwivedi, A.D., Singh, R., Ghosh, U., Mukkamala, R.R., Tolba, A., Said, O.: Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for internet of things. J. Ambient. Intell. Humaniz. Comput. 13(10), 4639\u20134649 (2022). https:\/\/doi.org\/10.1007\/s12652-021-03459-4","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"3","key":"917_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C Schnorr","year":"1991","unstructured":"Schnorr, C.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991). https:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J. Cryptol."},{"issue":"6","key":"917_CR10","doi-asserted-by":"publisher","first-page":"5760","DOI":"10.1109\/TVT.2020.2977361","volume":"69","author":"D Gabay","year":"2020","unstructured":"Gabay, D., Akkaya, K., Cebe, M.: Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs. IEEE Trans. Veh. Technol. 69(6), 5760\u20135772 (2020). https:\/\/doi.org\/10.1109\/TVT.2020.2977361","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"917_CR11","doi-asserted-by":"publisher","first-page":"12075","DOI":"10.1109\/TVT.2023.3265366","volume":"72","author":"M Fan","year":"2023","unstructured":"Fan, M., Zhang, Z., Li, Z., Sun, G., Yu, H., Guizani, M.: Blockchain-based decentralized and lightweight anonymous authentication for federated learning. IEEE Trans. Veh. Technol. 72(9), 12075\u201312086 (2023). https:\/\/doi.org\/10.1109\/TVT.2023.3265366","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"917_CR12","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.3390\/math11081929","volume":"11","author":"L Jiang","year":"2023","unstructured":"Jiang, L., Cui, H.: Private and mutual authentication protocols for internet of things. Mathematics 11(8), 1929 (2023). https:\/\/doi.org\/10.3390\/math11081929","journal-title":"Mathematics"},{"key":"917_CR13","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/TIFS.2020.3021917","volume":"16","author":"U Chaterjee","year":"2020","unstructured":"Chaterjee, U., Mukhopadhyay, D., Chakraborty, R.S.: 3PAA: A private PUF protocol for anonymous authentication. IEEE Trans. Inf. Forens. Secur. 16, 756\u201369 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.3021917","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"5","key":"917_CR14","doi-asserted-by":"publisher","first-page":"3484","DOI":"10.1109\/TII.2021.3097759","volume":"18","author":"S Jegadeesan","year":"2022","unstructured":"Jegadeesan, S., Azees, M., Rajasekaran, A.S., Al-Turjman, F.: Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANS. IEEE Trans Ind Inf. 18(5), 3484\u20133491 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3097759","journal-title":"IEEE Trans Ind Inf."},{"issue":"10","key":"917_CR15","doi-asserted-by":"publisher","first-page":"7118","DOI":"10.1109\/TII.2021.3129631","volume":"18","author":"Zisang Xu","year":"2022","unstructured":"Xu, Zisang, Liang, Wei, Li, Kuan-Ching., Xu, Jianbo, Zomaya, Albert Y.., Zhang, Jixin: A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE Trans. Ind. Inf. 18(10), 7118\u20137127 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3129631","journal-title":"IEEE Trans. Ind. Inf."},{"key":"917_CR16","doi-asserted-by":"publisher","unstructured":"Chen, M., Chen, S.: An efficient anonymous authentication protocol for RFID systems using dynamic tokens. In: 35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015, IEEE Computer Society, pp 756\u2013757 (2015) https:\/\/doi.org\/10.1109\/ICDCS.2015.94","DOI":"10.1109\/ICDCS.2015.94"},{"key":"917_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107337756","volume-title":"Secure Multiparty Computation and Secret Sharing","author":"R Cramer","year":"2015","unstructured":"Cramer, R., Damg\u00e5rd, I., Nielsen, J.B.: Secure Multiparty Computation and Secret Sharing. Cambridge University Press, Cambridge (2015)"},{"key":"917_CR18","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Advances in Cryptology","author":"Gustavus J. Simmons","year":"2000","unstructured":"Simmons, Gustavus J..: Authentication theory\/coding theory. In: Blakley, George Robert, Chaum, David (eds.) Advances in Cryptology, pp. 411\u2013431. Springer Berlin Heidelberg, Berlin, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-39568-7_32"},{"issue":"2","key":"917_CR19","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TIT.2008.2009842","volume":"55","author":"L Lai","year":"2009","unstructured":"Lai, L., Gamal, H.E., Poor, H.V.: Authentication over noisy channels. IEEE Trans. Inf. Theory 55(2), 906\u2013916 (2009). https:\/\/doi.org\/10.1109\/TIT.2008.2009842","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"917_CR20","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.1109\/18.850674","volume":"46","author":"UM Maurer","year":"2000","unstructured":"Maurer, U.M.: Authentication theory and hypothesis testing. IEEE Trans. Inf. Theory 46(4), 1350\u20131356 (2000). https:\/\/doi.org\/10.1109\/18.850674","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"917_CR21","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1109\/TWC.2008.070194","volume":"7","author":"L Xiao","year":"2008","unstructured":"Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W.: Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wirel. Commun. 7(7), 2571\u20132579 (2008). https:\/\/doi.org\/10.1109\/TWC.2008.070194","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"917_CR22","doi-asserted-by":"publisher","first-page":"3696","DOI":"10.1109\/TIT.2018.2809779","volume":"64","author":"W Tu","year":"2018","unstructured":"Tu, W., Lai, L.: Keyless authentication and authenticated capacity. IEEE Trans. Inf. Theory 64(5), 3696\u20133714 (2018). https:\/\/doi.org\/10.1109\/TIT.2018.2809779","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"917_CR23","doi-asserted-by":"publisher","first-page":"4075","DOI":"10.1109\/TIT.2017.2689028","volume":"63","author":"H Sun","year":"2017","unstructured":"Sun, H., Jafar, S.A.: The capacity of private information retrieval. IEEE Trans. Inf. Theory 63(7), 4075\u20134088 (2017). https:\/\/doi.org\/10.1109\/TIT.2017.2689028","journal-title":"IEEE Trans. Inf. Theory"},{"key":"917_CR24","doi-asserted-by":"publisher","unstructured":"Mirmohseni, M., Maddah-Ali, M.A.: Private function retrieval. In: Iran Workshop on Communication and Information Theory, IWCIT 2018, Tehran, Iran, 2018, IEEE, pp 1\u20136 (2018) https:\/\/doi.org\/10.1109\/IWCIT.2018.8405043","DOI":"10.1109\/IWCIT.2018.8405043"},{"issue":"6","key":"917_CR25","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TIFS.2013.2253320","volume":"8","author":"L Sankar","year":"2013","unstructured":"Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forens. Secur. 8(6), 838\u2013852 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2253320","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"917_CR26","doi-asserted-by":"publisher","unstructured":"Lai, L., Ho, S., Poor, H.V.: Privacy-security tradeoffs in biometric security systems. In: 46th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2008, Monticello, IL, USA, 2008, IEEE, pp 268\u2013273 (2008) https:\/\/doi.org\/10.1109\/ALLERTON.2008.4797566","DOI":"10.1109\/ALLERTON.2008.4797566"},{"issue":"4","key":"917_CR27","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TIFS.2009.2033228","volume":"4","author":"T Ignatenko","year":"2009","unstructured":"Ignatenko, T., Willems, F.M.J.: Biometric systems: privacy and secrecy aspects. IEEE Trans. Inf. Forens. Secur. 4(4), 956\u2013973 (2009). https:\/\/doi.org\/10.1109\/TIFS.2009.2033228","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"917_CR28","doi-asserted-by":"publisher","unstructured":"Willems F.M.J., Ignatenko, T.: Authentication based on secret-key generation. In: Proceedings of the 2012 IEEE International Symposium on Information Theory, IEEE, pp 1792\u20131796 (2012) https:\/\/doi.org\/10.1109\/ISIT.2012.6283587","DOI":"10.1109\/ISIT.2012.6283587"},{"issue":"11","key":"917_CR29","doi-asserted-by":"publisher","first-page":"16907","DOI":"10.1007\/s11042-020-09078-z","volume":"80","author":"Hafeez Ur Rehman","year":"2021","unstructured":"Rehman, Hafeez Ur, Ghani, Anwar, Chaudhry, Shehzad Ashraf, Alsharif, Mohammed H.., Nabipour, Narjes: A secure and improved multi server authentication protocol using fuzzy commitment. Multimed. Tools Appl. 80(11), 16907\u201316931 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09078-z","journal-title":"Multimed. Tools Appl."},{"issue":"12","key":"917_CR30","doi-asserted-by":"publisher","first-page":"5529","DOI":"10.3837\/tiis.2016.12.021","volume":"10","author":"A Irshad","year":"2016","unstructured":"Irshad, A., Sher, M., Ahmad, H.F., Alzahrani, B.A., Chaudhry, S.A., Kumar, R.: An improved multi-server authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. 10(12), 5529\u20135552 (2016). https:\/\/doi.org\/10.3837\/tiis.2016.12.021","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"917_CR31","doi-asserted-by":"publisher","unstructured":"Irshad, A., Alreshoodi, M.: SEMS-5G: a secure and efficient multi-server authentication scheme for 5g networks. IEEE Access 12, 49062\u201349077 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3381616","DOI":"10.1109\/ACCESS.2024.3381616"},{"issue":"1","key":"917_CR32","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1109\/TIT.2018.2848977","volume":"65","author":"H Sun","year":"2019","unstructured":"Sun, H., Jafar, S.A.: The capacity of symmetric private information retrieval. IEEE Trans. Inf. Theory 65(1), 322\u2013329 (2019). https:\/\/doi.org\/10.1109\/TIT.2018.2848977","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"917_CR33","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"issue":"1","key":"917_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIT.1976.1055508","volume":"22","author":"AD Wyner","year":"1976","unstructured":"Wyner, A.D., Ziv, J.: The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory 22(1), 1\u201310 (1976). https:\/\/doi.org\/10.1109\/TIT.1976.1055508","journal-title":"IEEE Trans. Inf. Theory"},{"key":"917_CR35","doi-asserted-by":"publisher","DOI":"10.1038\/srep28988","author":"M. Fujiwara","year":"2016","unstructured":"Fujiwara, M.., Waseda, A.., Nojima, R.., Moriai, S.., Ogata, W.., Sasaki, M..: Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing. Sci. Rep. (2016). https:\/\/doi.org\/10.1038\/srep28988","journal-title":"Sci. Rep."},{"issue":"3","key":"917_CR36","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/18.915643","volume":"47","author":"A Orlitsky","year":"2001","unstructured":"Orlitsky, A., Roche, J.R.: Coding for computing. IEEE Trans. Inf. Theory 47(3), 903\u2013917 (2001). https:\/\/doi.org\/10.1109\/18.915643","journal-title":"IEEE Trans. Inf. Theory"},{"key":"917_CR37","doi-asserted-by":"publisher","unstructured":"Gamal, A.E., Kim, Y.: Network Information Theory. Cambridge University Press (2011). https:\/\/doi.org\/10.1017\/CBO9781139030687","DOI":"10.1017\/CBO9781139030687"},{"key":"917_CR38","doi-asserted-by":"publisher","unstructured":"Wang, Q., Skoglund, M.: Secure symmetric private information retrieval from colluding databases with adversaries. In: 55th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2017, IEEE, pp 1083\u20131090 (2017) https:\/\/doi.org\/10.1109\/ALLERTON.2017.8262858","DOI":"10.1109\/ALLERTON.2017.8262858"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00917-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00917-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00917-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:14:06Z","timestamp":1739337246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00917-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["917"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00917-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"11 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"22"}}