Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key

被引:0
|
作者
Yu, Wangke [1 ]
Wang, Shuhua [1 ]
机构
[1] Jingdezhen Ceram Univ, Sch Informat Engn, Jingdezhen 333403, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 75卷 / 01期
关键词
Authentication; learning with errors; partial encryption; security; EFFICIENT;
D O I
10.32604/cmc.2023.035337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless network is the basis of the Internet of things and the intelligent vehicle Internet. Due to the complexity of the Internet of things and intelligent vehicle Internet environment, the nodes of the Internet of things and the intelligent vehicle Internet are more vulnerable to malicious destruc- tion and attacks. Most of the proposed authentication and key agreement protocols for wireless networks are based on traditional cryptosystems such as large integer decomposition and elliptic curves. With the rapid development of quantum computing, these authentication protocols based on traditional cryptography will be more and more threatened, so it is necessary to design some authentication and key agreement protocols that can resist quantum attacks. In this paper, an anti-quantum authentication scheme for wireless networks based on lattice cryptosystem is constructed. In the attribute-based authentication scheme, the length of the authenticated public-private key pair depends on the maximum order and complexity of the formula in the algorithm. In the attribute-based authentication scheme, there is a certain correlation between the authenticated data and the attribute value of the user in the scheme. We show that the attribute-based authentication scheme gives an attribute-based with smaller public-private key pairs. The security of the attribute-based authentication scheme is based on the sub-exponential hard problem of the LWE (Learning With Errors). The Q -poly made by the adversary in the scheme, and our attribute-based authentication scheme guarantees that private data about user attributes and ciphertext cannot be obtained by malicious attackers.
引用
收藏
页码:67 / 80
页数:14
相关论文
共 50 条
  • [21] Improvement of an outsourced attribute-based encryption scheme
    Hongjie Chen
    Yongjian Liao
    [J]. Soft Computing, 2019, 23 : 11409 - 11417
  • [22] Mitigating key escrow in attribute-based encryption
    Wang, Yongtao
    Liu, Xiaonan
    Liang, Lulu
    Feng, Weiduan
    Yang, Guang
    [J]. International Journal of Network Security, 2015, 17 (01) : 94 - 102
  • [23] Traceable attribute-based encryption scheme with key-delegation abuse resistance
    Yan X.
    He X.
    Liu T.
    Ye Q.
    Yu J.
    Tang Y.
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 150 - 161
  • [24] Attribute-Based Key-Insulated Encryption
    Chen, Jian-Hong
    Wang, Yong-Tao
    Chen, Ke-Fei
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 437 - 449
  • [25] Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme
    Wang, Changji
    Lin, Haitao
    Xu, Xilei
    Zheng, Kangjia
    Xia, Xiaonan
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 459 - 463
  • [26] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Ruizhong Du
    Ailun Tan
    Junfeng Tian
    [J]. Tsinghua Science and Technology, 2020, 25 (05) : 579 - 588
  • [27] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Du, Ruizhong
    Tan, Ailun
    Tian, Junfeng
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 579 - 588
  • [28] Traceable Attribute-Based Encryption on OBDD Access Structure from Lattice
    Guo Kaiyang
    Han Yiliang
    Liu Kai
    Wu Riming
    [J]. 2022 11TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS (ICCCAS 2022), 2022, : 210 - 215
  • [29] A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things
    Zhang, Zhishuo
    Zhou, Shijie
    [J]. COMPUTER NETWORKS, 2021, 201
  • [30] Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Hao, Jialu
    Jiang, Tao
    Wang, Xiangyu
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3999 - 4011