An Improved Fuzzy Attribute-Based Authentication

被引:0
|
作者
Yun, Jong Pil [1 ]
Kim, Hyoseung [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Seoul, South Korea
关键词
Fuzzy attribute; Authentication; Impersonation attack; Collusion attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation
    Zhu, Shuhua
    Zhan, Li
    Qiang, Hengchang
    Fu, Danlong
    Sun, Wei
    Tang, Yong
    [J]. HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 685 - 692
  • [2] A Dynamic Attribute-Based Authentication Scheme
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118
  • [3] Traceable Hierarchical Attribute-based Authentication for the Cloud
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 685 - 689
  • [4] Attribute-based authentication on the cloud for thin clients
    Ibrahim, Maged Hamada
    Kumari, Saru
    Das, Ashok Kumar
    Odelu, Vanga
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5813 - 5845
  • [5] Attribute-based authentication on the cloud for thin clients
    Maged Hamada Ibrahim
    Saru Kumari
    Ashok Kumar Das
    Vanga Odelu
    [J]. The Journal of Supercomputing, 2018, 74 : 5813 - 5845
  • [6] Attribute-Based Encryption with Authentication Provider in FIWARE Platform
    Ponomarev, K. Y.
    Nissenbaum, O. V.
    [J]. 2018 12TH INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE ON DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2018,
  • [7] A Multi Sender Attribute-Based Broadcast Authentication Scheme
    Aghapour, Saeed
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 78 - 83
  • [8] Attribute-based Continuous User Authentication on Mobile Devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [9] Attribute-based interactions in a distributed authentication and authorization infrastructure
    López, DR
    Castro-Rojo, R
    [J]. 14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 438 - 442
  • [10] Attribute-based authentication model for dynamic mobile environments
    Covington, Michael J.
    Sastry, Manoj R.
    Manohar, Deepak J.
    [J]. SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 227 - 242