A Dynamic Attribute-Based Authentication Scheme

被引:3
|
作者
Yang, Huihui [1 ]
Oleshchuk, Vladimir A. [1 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, N-4630 Kristiansand S, Norway
关键词
Authentication; Attribute-based authentication; Attribute tree; Privacy;
D O I
10.1007/978-3-319-18681-8_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating the whole attribute tree each time attribute requirements change.
引用
收藏
页码:106 / 118
页数:13
相关论文
共 50 条
  • [31] A dynamic attribute-based data filtering and recovery scheme for web information processing
    Ahuja, Amit
    Ng, Yiu-Kai
    KNOWLEDGE AND INFORMATION SYSTEMS, 2009, 18 (03) : 263 - 291
  • [32] Software Implementation of an Attribute-Based Encryption Scheme
    Zavattoni, Eric
    Dominguez Perez, Luis J.
    Mitsunari, Shigeo
    Sanchez-Ramirez, Ana H.
    Teruya, Tadanori
    Rodriguez-Henriquez, Francisco
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1429 - 1441
  • [33] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [34] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 487 - 492
  • [35] Improvement of an outsourced attribute-based encryption scheme
    Chen, Hongjie
    Liao, Yongjian
    SOFT COMPUTING, 2019, 23 (22) : 11409 - 11417
  • [36] Cryptanalysis of attribute-based ring signcryption scheme
    Xiong, Hu
    Geng, Ji
    Qin, Zhiguang
    Zhu, Guobin
    International Journal of Network Security, 2015, 17 (02) : 224 - 228
  • [37] An Efficient Attribute-Based Ring Signature Scheme
    Wang Wenqiang
    Chen Shaozhen
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 147 - 150
  • [38] An Attribute-Based Distributed Data Sharing Scheme
    Zaghloul, Ehab
    Li, Tongtong
    Ren, Jian
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [39] Efficient revocable attribute-based encryption scheme
    Li X.
    Zhang D.
    Li H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [40] Attribute-based Encryption Scheme with Fast Encryption
    一种支持快速加密的基于属性加密方案
    Feng, Chao-Sheng (csfenggy@126.com), 1600, Chinese Academy of Sciences (31): : 3923 - 3936