An Improved Fuzzy Attribute-Based Authentication

被引:0
|
作者
Yun, Jong Pil [1 ]
Kim, Hyoseung [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Seoul, South Korea
关键词
Fuzzy attribute; Authentication; Impersonation attack; Collusion attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key
    Yu, Wangke
    Wang, Shuhua
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 67 - 80
  • [42] PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks
    Guo, Linke
    Zhang, Chi
    Sun, Jinyuan
    Fang, Yuguang
    [J]. 2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, : 224 - 233
  • [43] Attribute-Based Signatures
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 376 - +
  • [44] Attribute-based fuzzy identity access control in multicloud computing environments
    Li, Wenmin
    Wen, Qiaoyan
    Li, Xuelei
    He, Debiao
    [J]. SOFT COMPUTING, 2018, 22 (12) : 4071 - 4082
  • [45] Attribute-based fuzzy identity access control in multicloud computing environments
    Wenmin Li
    Qiaoyan Wen
    Xuelei Li
    Debiao He
    [J]. Soft Computing, 2018, 22 : 4071 - 4082
  • [46] Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme
    Hu, Chunqiang
    Zhang, Nan
    Li, Hongjuan
    Cheng, Xiuzhen
    Liao, Xiaofeng
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 37 - 46
  • [47] A Feasible Fuzzy-Extended Attribute-Based Access Control Technique
    Xu, Yang
    Gao, Wuqiang
    Zeng, Quanrun
    Wang, Guojun
    Ren, Ju
    Zhang, Yaoxue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [48] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Li, Jin
    Wang, Qian
    Wang, Cong
    Ren, Kui
    [J]. MOBILE NETWORKS & APPLICATIONS, 2011, 16 (05): : 553 - 561
  • [49] New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing
    Hafizpour, Hadis
    Shiri, Mohammad Ebrahim
    Rahmani, Amir Masoud
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [50] A fine-grained attribute-based authentication for sensitive data stored in cloud computing
    Liu, Zhusong
    Luo, Jinman
    Xu, Lingling
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2016, 7 (04) : 237 - 244