Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices

被引:1
|
作者
Su, Ye [1 ,2 ]
Zhang, Xi [3 ]
Qin, Jing [3 ,4 ]
Ma, Jixin [5 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250358, Peoples R China
[2] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[3] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Univ Greenwich, Sch Comp & Math Sci, Ctr Comp & Computat Sci, London SE10 9LS, England
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 15期
关键词
Aggregated anonymous key issue (AAKI); attribute-based signature (ABS); Blakley secret sharing; Internet of Things (IoT) authentication; multiauthority; Proof of Knowledge (PoK); SIGNATURE SCHEME;
D O I
10.1109/JIOT.2023.3263497
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The correctness and reliability of data sources are the keys to the practicality of data collected by Internet of Things (IoT) devices. Attribute-based signature (ABS) is a cryptographic primitive for users to sign with their own attributes, which can be applied to the authentication process in IoT scenarios. The attribute authority is responsible for issuing the attribute key to the user in ABS. Multiple authorities can complete attribute management tasks to avoid the threat of a single authority. However, attribute authorities need to execute multiple interactions to collaborate to generate attribute keys for users, which brings a large transmission burden. In addition, a lot of resource-constrained terminals in the IoT mostly play the role of signer or verifier in authentication protocols. The signature generation and verification algorithms often have heavy pairing and exponentiation operations. Currently, no ABS scheme takes into account the efficiency of all participating entities simultaneously. In this article, we present an aggregated anonymous key issue (AAKI) protocol to reduce the transmission burden between multiple authorities. Meanwhile, the noninteractive zero-knowledge proof aggregate exponentiation (NI-ZKPoKAE) protocol is designed to aggregate the transmitted secret values in AAKI. To reduce the computational burden of signers and verifiers, Blakley secret sharing, where the Hadamard matrix is used more efficiently to handle the $(n, n)$ -threshold, is used to construct an efficient and fine-grained multiauthority ABS (EFMA-ABS) scheme. This brings high efficiency to all three types of parties involved in IoT authentication. Our above-mentioned protocols have been proven to be feasible and effective.
引用
收藏
页码:13945 / 13958
页数:14
相关论文
共 50 条
  • [1] Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1731 - 1742
  • [2] Multiauthority Attribute-Based Encryption for Assuring Data Deletion
    Li, Jiguo
    Zhang, Ruyuan
    Lu, Yang
    Han, Jinguang
    Zhang, Yichen
    Zhang, Wenzheng
    Dong, Xinfeng
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2029 - 2038
  • [3] Attribute-based Continuous User Authentication on Mobile Devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [4] Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating
    Ling, Jie
    Chen, Junwei
    Chen, Jiahui
    Gan, Wensheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    Kuo, I-Hua
    [J]. IEEE ACCESS, 2022, 10 : 58254 - 58267
  • [6] Performance evaluation of Attribute-Based Encryption on constrained IoT devices*
    Perazzo, Pericle
    Righetti, Francesca
    La Manna, Michele
    Vallati, Carlo
    [J]. COMPUTER COMMUNICATIONS, 2021, 170 : 151 - 163
  • [7] A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
    Zhang, Kai
    Li, Yanping
    Song, Yun
    Lu, Laifeng
    Zhang, Tao
    Jiang, Qi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [8] Convolutional Neural Networks for Attribute-based Active Authentication On Mobile Devices
    Samangouei, Pouya
    Chellappa, Rama
    [J]. 2016 IEEE 8TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2016,
  • [9] New Directions in IoT Privacy Using Attribute-Based Authentication Position Paper
    Alpar, Gergely
    Batina, Lejla
    Batten, Lynn
    Moonsamy, Veelasha
    Krasnova, Anna
    Guellier, Antoine
    Natgunanathan, Iynkaran
    [J]. PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 461 - 466
  • [10] An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. SECURE IT SYSTEMS, NORDSEC 2015, 2015, 9417 : 123 - 135