A Dynamic Attribute-Based Authentication Scheme

被引:3
|
作者
Yang, Huihui [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, N-4630 Kristiansand S, Norway
关键词
Authentication; Attribute-based authentication; Attribute tree; Privacy;
D O I
10.1007/978-3-319-18681-8_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating the whole attribute tree each time attribute requirements change.
引用
收藏
页码:106 / 118
页数:13
相关论文
共 50 条
  • [1] A Multi Sender Attribute-Based Broadcast Authentication Scheme
    Aghapour, Saeed
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 78 - 83
  • [2] Attribute-based authentication model for dynamic mobile environments
    Covington, Michael J.
    Sastry, Manoj R.
    Manohar, Deepak J.
    [J]. SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 227 - 242
  • [3] An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things
    Duan, Xiangjun
    Li, Yunshuo
    Xu, Yuanyuan
    Liu, Wei
    Zhang, Zhengkai
    Liu, Lei
    Li, Ying
    Xu, Mengyu
    [J]. PROCEEDINGS OF THE 2024 3RD INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATIONS AND INFORMATION TECHNOLOGY, CNCIT 2024, 2024, : 161 - 165
  • [4] An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. SECURE IT SYSTEMS, NORDSEC 2015, 2015, 9417 : 123 - 135
  • [5] A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation
    Zhu, Shuhua
    Zhan, Li
    Qiang, Hengchang
    Fu, Danlong
    Sun, Wei
    Tang, Yong
    [J]. HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 685 - 692
  • [6] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [7] An Improved Fuzzy Attribute-Based Authentication
    Yun, Jong Pil
    Kim, Hyoseung
    Lee, Dong Hoon
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [8] Attribute-based signature scheme
    Guo Shaniqng
    Zeng Yingpei
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 509 - +
  • [9] Attribute-based authentication for multi-agent systems with dynamic groups
    Zhang, Qi
    Mu, Yi
    Zhang, Minjie
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 436 - 446
  • [10] Searchable Attribute-based Encryption Scheme for Dynamic User Groups
    Wang, Jing-Wei
    Ning, Jian-Ting
    Xu, Sheng-Min
    Yin, Xin-Chun
    Chen, Hai-Xia
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1907 - 1925