Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key

被引:0
|
作者
Yu, Wangke [1 ]
Wang, Shuhua [1 ]
机构
[1] Jingdezhen Ceram Univ, Sch Informat Engn, Jingdezhen 333403, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 75卷 / 01期
关键词
Authentication; learning with errors; partial encryption; security; EFFICIENT;
D O I
10.32604/cmc.2023.035337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless network is the basis of the Internet of things and the intelligent vehicle Internet. Due to the complexity of the Internet of things and intelligent vehicle Internet environment, the nodes of the Internet of things and the intelligent vehicle Internet are more vulnerable to malicious destruc- tion and attacks. Most of the proposed authentication and key agreement protocols for wireless networks are based on traditional cryptosystems such as large integer decomposition and elliptic curves. With the rapid development of quantum computing, these authentication protocols based on traditional cryptography will be more and more threatened, so it is necessary to design some authentication and key agreement protocols that can resist quantum attacks. In this paper, an anti-quantum authentication scheme for wireless networks based on lattice cryptosystem is constructed. In the attribute-based authentication scheme, the length of the authenticated public-private key pair depends on the maximum order and complexity of the formula in the algorithm. In the attribute-based authentication scheme, there is a certain correlation between the authenticated data and the attribute value of the user in the scheme. We show that the attribute-based authentication scheme gives an attribute-based with smaller public-private key pairs. The security of the attribute-based authentication scheme is based on the sub-exponential hard problem of the LWE (Learning With Errors). The Q -poly made by the adversary in the scheme, and our attribute-based authentication scheme guarantees that private data about user attributes and ciphertext cannot be obtained by malicious attackers.
引用
收藏
页码:67 / 80
页数:14
相关论文
共 50 条
  • [1] Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice
    Han, Yiliang
    Guo, Kaiyang
    Wu, Riming
    Liu, Kai
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (01): : 75 - 88
  • [2] An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things
    Duan, Xiangjun
    Li, Yunshuo
    Xu, Yuanyuan
    Liu, Wei
    Zhang, Zhengkai
    Liu, Lei
    Li, Ying
    Xu, Mengyu
    [J]. PROCEEDINGS OF THE 2024 3RD INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATIONS AND INFORMATION TECHNOLOGY, CNCIT 2024, 2024, : 161 - 165
  • [3] Accountable attribute-based encryption scheme without key escrow
    Zhang, Xing
    Wen, Zilong
    Shen, Qingni
    Fang, Yuejian
    Wu, Zhonghai
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2293 - 2303
  • [4] Efficient key-policy attribute-based encryption scheme
    Xu, Zhiqin
    Zhang, Leyou
    [J]. ICIC Express Letters, 2015, 9 (01): : 31 - 35
  • [5] An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices
    Liu, Lihua
    Wang, Shangping
    [J]. LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018, 613 : 217 - 230
  • [6] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    [J]. Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936
  • [7] Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext
    Liu, Yuan
    Pan, Yun
    Gu, Lize
    Zhang, Yuan
    An, Dezhi
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [8] Key Cooperative Attribute-Based Encryption
    Huang, Luqi
    Susilo, Willy
    Yang, Guomin
    Guo, Fuchun
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 241 - 260
  • [9] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    [J]. Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [10] A Dynamic Attribute-Based Authentication Scheme
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118