An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

被引:0
|
作者
Yang, Huihui [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, Kristiansand, Norway
来源
关键词
Attribute-Based Authentication; ABA; Traceability; Attribute tree;
D O I
10.1007/978-3-319-26502-5_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer's attribute private keys in order to generate a signature. In some schemes, signers' attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers' attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a different attribute tree for each signature generation and verification, which is called "onetime" attribute tree in this paper.
引用
收藏
页码:123 / 135
页数:13
相关论文
共 50 条
  • [1] Traceable Hierarchical Attribute-based Authentication for the Cloud
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 685 - 689
  • [2] Efficient Traceable Attribute-Based Signature
    Ding, Shenglong
    Zhao, Yiming
    Liu, Yuyang
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 582 - 589
  • [3] A Dynamic Attribute-Based Authentication Scheme
    Yang, Huihui
    Oleshchuk, Vladimir A.
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118
  • [4] Traceable attribute-based signature
    Gu, Ke
    Wang, Keming
    Yang, Lulu
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [5] Traceable attribute-based signcryption
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2302 - 2317
  • [6] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [7] Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment
    Yan, Xixi
    Yuan, Xiaohan
    Zhang, Qichao
    Tang, Yongli
    [J]. IEEE ACCESS, 2020, 8 : 38285 - 38295
  • [8] Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting
    Li, Peng
    Lai, Junzuo
    Wu, Yongdong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] A Multi Sender Attribute-Based Broadcast Authentication Scheme
    Aghapour, Saeed
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 78 - 83
  • [10] An Efficient Attribute-Based Ring Signature Scheme
    Wang Wenqiang
    Chen Shaozhen
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 147 - 150