Skip to main content

A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8944))

Included in the following conference series:

Abstract

Attribute-based encryption algorithm has been widely used to design mechanisms for access control and signature. The algorithm can also be introduced to the study of the authentication scheme and provides users with more flexibility and richer in descriptions. Based on Shamir’s Lagrange Polynomial Interpolation, we proposed a fuzzy attribute-based authentication scheme that enables the users to be authenticated only if their attributes satisfy the authorized attributes, aiming to design a flexible and safe attribute authentication scheme that uses fewer system resources for multi-networks’ users wireless roaming. Analyses have indicated that this scheme can resist the man-in-the-middle attacks, replay attacks and collusion attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)

    Google Scholar 

  3. Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE of INFOCOM, pp. 1–9. IEEE (2010)

    Google Scholar 

  4. Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Erber, R., Schlager, C., Pernul, G.: Patterns for authentication and authorisation infrastructures. In: 18th International Workshop on Database and Expert Systems Applications, 2007, DEXA’07, pp. 755–759. IEEE (2007)

    Google Scholar 

  7. Barua, M., Liang, X., Lu, R.: Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 970–975. IEEE (2011)

    Google Scholar 

  8. Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 47–52. ACM (2010)

    Google Scholar 

  9. Guo, L., Zhang, C., Sun, J.: PAAS: A privacy-preserving attribute-based authentication system for ehealth networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 224–233. IEEE (2012)

    Google Scholar 

  10. Batina, L., Hoepman, J.-H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 209–222. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Kiyomoto, S., Fukushima, K., Tanaka, T.: Design of anonymous attribute authentication mechanism. IEICE Transactions on Communications 92(4), 1112–1118 (2009)

    Article  Google Scholar 

  12. Haeryong, P.: Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme. IEICE Transactions on Communications 92(9), 2946–2947 (2009)

    Google Scholar 

  13. Du, S., Wang, S.: Property-based chameleon remote attestation. Computer Engineering and Design 33(11), 4081–4085 (2012)

    MathSciNet  Google Scholar 

  14. Liu, J., Wang, J., Zhuang, Y.: Fuzzy attribute authentication scheme based on vector space. Computer Engineering and Applications 48(19) (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuhua Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhu, S., Zhan, L., Qiang, H., Fu, D., Sun, W., Tang, Y. (2015). A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation. In: Zu, Q., Hu, B., Gu, N., Seng, S. (eds) Human Centered Computing. HCC 2014. Lecture Notes in Computer Science(), vol 8944. Springer, Cham. https://doi.org/10.1007/978-3-319-15554-8_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15554-8_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15553-1

  • Online ISBN: 978-3-319-15554-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics