An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

被引:0
|
作者
Yang, Huihui [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, Kristiansand, Norway
来源
关键词
Attribute-Based Authentication; ABA; Traceability; Attribute tree;
D O I
10.1007/978-3-319-26502-5_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer's attribute private keys in order to generate a signature. In some schemes, signers' attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers' attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a different attribute tree for each signature generation and verification, which is called "onetime" attribute tree in this paper.
引用
下载
收藏
页码:123 / 135
页数:13
相关论文
共 50 条
  • [21] Attribute-based broadcast encryption scheme made efficient
    Lubicz, David
    Sirvent, Thomas
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 325 - +
  • [22] Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
    Wang, Shangping
    Guo, Keke
    Zhang, Yaling
    PLOS ONE, 2018, 13 (09):
  • [23] An Efficient and Anonymous Attribute-Based Group Setup Scheme
    Li, Bing
    Wang, Zhijie
    Huang, Dijiang
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 861 - 866
  • [24] An Improved Fuzzy Attribute-Based Authentication
    Yun, Jong Pil
    Kim, Hyoseung
    Lee, Dong Hoon
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [25] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [26] Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices
    Su, Ye
    Zhang, Xi
    Qin, Jing
    Ma, Jixin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (15) : 13945 - 13958
  • [27] Traceable attribute-based encryption scheme with key-delegation abuse resistance
    Yan X.
    He X.
    Liu T.
    Ye Q.
    Yu J.
    Tang Y.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (04): : 150 - 161
  • [28] Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
    Liu, Zhenhua
    Duan, Shuhong
    Zhou, Peilin
    Wang, Baocang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 903 - 913
  • [29] Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model
    Li J.
    Zhu L.
    Liu C.
    Lu Y.
    Han J.
    Wang H.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2253 - 2264
  • [30] TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain
    Guo, Lifeng
    Yang, Xiaoli
    Yau, Wei-Chuen
    IEEE ACCESS, 2021, 9 (09): : 8479 - 8490