Abstract
Attribute-based encryption algorithm has been widely used to design mechanisms for access control and signature. The algorithm can also be introduced to the study of the authentication scheme and provides users with more flexibility and richer in descriptions. Based on Shamir’s Lagrange Polynomial Interpolation, we proposed a fuzzy attribute-based authentication scheme that enables the users to be authenticated only if their attributes satisfy the authorized attributes, aiming to design a flexible and safe attribute authentication scheme that uses fewer system resources for multi-networks’ users wireless roaming. Analyses have indicated that this scheme can resist the man-in-the-middle attacks, replay attacks and collusion attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE of INFOCOM, pp. 1–9. IEEE (2010)
Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011)
Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009)
Erber, R., Schlager, C., Pernul, G.: Patterns for authentication and authorisation infrastructures. In: 18th International Workshop on Database and Expert Systems Applications, 2007, DEXA’07, pp. 755–759. IEEE (2007)
Barua, M., Liang, X., Lu, R.: Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 970–975. IEEE (2011)
Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 47–52. ACM (2010)
Guo, L., Zhang, C., Sun, J.: PAAS: A privacy-preserving attribute-based authentication system for ehealth networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 224–233. IEEE (2012)
Batina, L., Hoepman, J.-H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 209–222. Springer, Heidelberg (2010)
Kiyomoto, S., Fukushima, K., Tanaka, T.: Design of anonymous attribute authentication mechanism. IEICE Transactions on Communications 92(4), 1112–1118 (2009)
Haeryong, P.: Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme. IEICE Transactions on Communications 92(9), 2946–2947 (2009)
Du, S., Wang, S.: Property-based chameleon remote attestation. Computer Engineering and Design 33(11), 4081–4085 (2012)
Liu, J., Wang, J., Zhuang, Y.: Fuzzy attribute authentication scheme based on vector space. Computer Engineering and Applications 48(19) (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhu, S., Zhan, L., Qiang, H., Fu, D., Sun, W., Tang, Y. (2015). A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation. In: Zu, Q., Hu, B., Gu, N., Seng, S. (eds) Human Centered Computing. HCC 2014. Lecture Notes in Computer Science(), vol 8944. Springer, Cham. https://doi.org/10.1007/978-3-319-15554-8_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-15554-8_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15553-1
Online ISBN: 978-3-319-15554-8
eBook Packages: Computer ScienceComputer Science (R0)