Independently Verifiable Decentralized Role-Based Delegation

被引:4
|
作者
Tamassia, Roberto
Yao, Danfeng [1 ]
Winsborough, William H. [2 ]
机构
[1] Virginia Polytech Inst & State Univ, Dept Comp Sci, Blacksburg, VA 24061 USA
[2] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
基金
美国国家科学基金会;
关键词
Decentralized delegation; digital credentials; SYSTEM;
D O I
10.1109/TSMCA.2010.2045118
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In open systems such as cloud computing platforms, delegation transfers privileges among users across different administrative domains and facilitates information sharing. We present an independently verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators. Our protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration; in the meantime, a delegation chain can be verified by anyone without the participation of role administrators. We also describe an efficient realization of RBCD by using aggregate signatures, where the authentication information for an arbitrarily long role-based delegation chain is captured by one short signature of constant size.
引用
收藏
页码:1206 / 1219
页数:14
相关论文
共 50 条
  • [41] The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks
    Meleshko, Aleksey
    Desnitsky, Vasily
    TELECOM, 2024, 5 (01): : 145 - 175
  • [42] Efficient Techniques for Publicly Verifiable Delegation of Computation
    Elkhiyaoui, Kaoutar
    Oenen, Melek
    Azraoui, Monir
    Molva, Refik
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 119 - 128
  • [43] A new concept in protocols: Verifiable computational delegation
    Landrock, P
    SECURITY PROTOCOLS, 1999, 1550 : 137 - 153
  • [44] A tool for role-based chatting
    Zhu, Haibin
    Alkins, Rob
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2505 - 2510
  • [45] Role-based authentication protocol
    Yao, Hongyan
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 460 - 470
  • [46] Role-Based Graph Embeddings
    Ahmed, Nesreen K.
    Rossi, Ryan A.
    Lee, John Boaz
    Willke, Theodore L.
    Zhou, Rong
    Kong, Xiangnan
    Eldardiry, Hoda
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (05) : 2401 - 2415
  • [47] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [48] Verifiable Delegation of Computation over Large Datasets
    Benabbas, Siavosh
    Gennaro, Rosario
    Vahlis, Yevgeniy
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 111 - 131
  • [49] A Basic Framework of Blockchain-Based Decentralized Verifiable Outsourcing
    Wang, Han
    Wang, Xu An
    Wang, Wei
    Xiao, Shuai
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS - 2019, 2020, 1035 : 415 - 421
  • [50] Role-based infrastructures for agents
    Cabri, G
    EIGHTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 210 - 214