Role-based authentication protocol

被引:0
|
作者
Yao, Hongyan [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
关键词
authentication; privacy protection; role-based authorization; hash chain; ACCESS-CONTROL; PRIVACY;
D O I
10.1002/sec.180
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes a new role-based authentication protocol, which is different from identity-based authentication model. The protocol does not disclose any unique identifier that is bound to user's identity. By verifying user's role the protocol can convince service the user is valid and his role is acceptable. Protocol can achieve the goal of authentication and meet identity privacy requirement at the same time. Protocol analysis indicates the protocol is easy to cooperate with role-based authorization and is safer than multi-server authentication schema. Simulation proves the protocol satisfies both authentication and identity privacy requirements. Protocol is safe and easy to realize. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
  • [1] Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID
    Chen, Bing-Chang
    Yang, Cheng-Ta
    Yeh, Her-Tyan
    Lin, Ching-Chao
    [J]. APPLIED SCIENCES-BASEL, 2016, 6 (08):
  • [2] Combining authentication with role-based access control based on IBS
    Wang, Jin
    Yu, Jia
    Li, Daxing
    Jia, Zhongtian
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1475 - 1480
  • [3] Role-based PMI authentication model and its application
    Zhu yanqin
    Qian Peide
    Liu Yueqin
    [J]. SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 407 - +
  • [4] From protocol stack to protocol heap role-based architecture
    Braden, R
    Faber, T
    Handley, M
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (01) : 17 - 22
  • [5] A role-based specification of the SET payment transaction protocol
    Sakurada, H
    Tsukada, Y
    [J]. ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 1 - 13
  • [6] Role-based Enhancement of Secure Authentication for RF-UCard Systems
    Cao, Jichang
    Shu, Lin
    Lu, Zhengding
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2891 - 2894
  • [7] Combining user authentication with role-based authorazition based on identity-based signature
    Wang, Jin
    Yu, Jia
    Li, Daxing
    Bai, Xi
    Jia, Zhongtian
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 847 - +
  • [8] User authentication using Blockchain based smart contract in role-based access control
    Priyanka Kamboj
    Shivang Khare
    Sujata Pal
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 2961 - 2976
  • [9] User authentication using Blockchain based smart contract in role-based access control
    Kamboj, Priyanka
    Khare, Shivang
    Pal, Sujata
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2961 - 2976
  • [10] Role-Based Administration of Role-Based Smart Home IoT
    Shakarami, Mehrnoosh
    Sandhu, Ravi
    [J]. SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 49 - 58