An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

被引:0
|
作者
Yang, Huihui [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, Kristiansand, Norway
来源
关键词
Attribute-Based Authentication; ABA; Traceability; Attribute tree;
D O I
10.1007/978-3-319-26502-5_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer's attribute private keys in order to generate a signature. In some schemes, signers' attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers' attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a different attribute tree for each signature generation and verification, which is called "onetime" attribute tree in this paper.
引用
下载
收藏
页码:123 / 135
页数:13
相关论文
共 50 条
  • [41] Attribute-based ring signcryption scheme
    Guo, Zhenzhou
    Li, Mingchu
    Fan, Xinxin
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 790 - 796
  • [42] Attribute-based authentication on the cloud for thin clients
    Ibrahim, Maged Hamada
    Kumari, Saru
    Das, Ashok Kumar
    Odelu, Vanga
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5813 - 5845
  • [43] A Hierarchical Attribute-Based Encryption Scheme
    ZOU Xiubin
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 259 - 264
  • [44] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [45] A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
    Han, Dezhi
    Pan, Nannan
    Li, Kuan-Ching
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 316 - 327
  • [46] Attribute-based authentication on the cloud for thin clients
    Maged Hamada Ibrahim
    Saru Kumari
    Ashok Kumar Das
    Vanga Odelu
    The Journal of Supercomputing, 2018, 74 : 5813 - 5845
  • [47] Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key
    Yu, Wangke
    Wang, Shuhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 67 - 80
  • [48] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [49] Searchable attribute-based encryption scheme with attribute revocation in cloud storage
    Wang, Shangping
    Zhao, Duqiao
    Zhang, Yaling
    PLOS ONE, 2017, 12 (08):
  • [50] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613