An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

被引:0
|
作者
Yang, Huihui [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, Kristiansand, Norway
来源
关键词
Attribute-Based Authentication; ABA; Traceability; Attribute tree;
D O I
10.1007/978-3-319-26502-5_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer's attribute private keys in order to generate a signature. In some schemes, signers' attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers' attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a different attribute tree for each signature generation and verification, which is called "onetime" attribute tree in this paper.
引用
收藏
页码:123 / 135
页数:13
相关论文
共 50 条
  • [31] A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation
    Zhu, Shuhua
    Zhan, Li
    Qiang, Hengchang
    Fu, Danlong
    Sun, Wei
    Tang, Yong
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 685 - 692
  • [32] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [33] Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain
    Zhang, Jixin
    Chen, Jiageng
    COMPUTER JOURNAL, 2023, 66 (04): : 842 - 865
  • [34] On Enabling Attribute-Based Encryption to Be Traceable Against Traitors
    Liu, Zhen
    Huang, Qiong
    Wong, Duncan S.
    COMPUTER JOURNAL, 2021, 64 (04): : 575 - 598
  • [35] Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
    Li, Huixian
    Pang, Liaojun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [36] An Efficient Self-blindable Attribute-Based Credential Scheme
    Ringers, Sietse
    Verheul, Eric
    Hoepman, Jaap-Henk
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 3 - 20
  • [37] Efficient key-policy attribute-based encryption scheme
    Xu, Zhiqin
    Zhang, Leyou
    ICIC Express Letters, 2015, 9 (01): : 31 - 35
  • [38] Efficient Ciphertext Deduplication and Auditing Scheme with Attribute-based Encryption
    Ma Hua
    Dang Qianlong
    Wang Jianfeng
    Liu Zhenhua
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (02) : 355 - 361
  • [39] Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    Wang Jianhua
    Wang Guangbo
    Xu Yang
    Hu Yixiao
    Zhang Yue
    Fan Liwen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 802 - 810
  • [40] A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios
    Zhao, Yang
    Liu, Zhaozhong
    An, Jingmin
    Zhu, Guobin
    Kumari, Saru
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 624 - 639