Abstract
Aadhaar is one of the largest biometric identity systems in the world which aims to assign a unique digital identity to each resident of India. A resident can authenticate himself using his Aadhaar number and a biometric. Biometric is a very sensitive data, and registered devices were introduced to eliminate the use of stored biometrics. Each registered device is supposed to have a unique identity and to follow suggested best practices to ensure security. With the proliferation of digital services, the use of registered devices is expected to grow more in near future. Although registered device is a good initiative, attribute-based access and communication may not be very efficient at present. In the present world of ubiquitous computing, IoT and 5G, a device may need to provide an assurance that it possesses a certain set of requisite attributes rather than some serial or a model number. Furthermore, owner of the device may not want to reveal device identity to protect his privacy since device identity may be correlated with owner’s identity. In this paper, we present an efficient scheme of privacy enhanced attribute-based registered devices for fine-grained access control using attribute-based signature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
UIDAI, About UIDAI (2009) https://uidai.gov.in/about-uidai.html
Banerjee S (2016) Aadhaar: Digital inclusion and public services in India. World Development Report, pp 81–92
UIDAI, Annual Report 2018-19 (2019) https://uidai.gov.in/images/AADHAR_AR_2018_19_ENG_approved.pdf
UIDAI, Aadhaar eKYC API Specification, v2.1 (2017) https://uidai.gov.in/images/resource/aadhaar_ekyc_api_2_1.pdf
MeitY, Digital Locker Technical Specification, v2.3 (2015) https://img1.digitallocker.gov.in/assets/img/technical-specifications-dlts-ver-2.3.pdf
CCA, eSign API Specifications v3.2 (2019) http://cca.gov.in/sites/files/pdf/esign/eSign-APIv3.2.pdf
UIDAI, Aadhaar Registered Devices Technical Specification v2.0 (2019) https://uidai.gov.in/images/resource/Aadhaar_Registered_Devices_2_0_4.pdf
UIDAI, Aadhaar Authentication API Specification v2.0 (2017) https://uidai.gov.in/images/FrontPageUpdates/aadhaar_authentication_api_2_0.pdf
Shanqing G, Yingpei Z (2008) Attribute-based signature scheme. In: International conference on information security and assurance
Whitfield D, Hellman M (1976) New directions in cryptography. In: IEEE transactions on information theory, pp 644–654
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Theory and application of cryptographic techniques workshop, pp 47–53
Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. Int Cryptology Conf 213–229
Goyal V et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: 13th ACM conference proceedings on computer and communications security, pp 89-98
Bethencourt J et al (2007) Ciphertext-policy attribute-based encryption. In: Symposium on security and privacy, pp 321–334
Shanqing G, Yingpei Z (2008) Attribute-based signature scheme. In: International conference on information security and assurance, pp 509–511
Tan S et al (2009) On the security of an attribute-based signature scheme. In: International conference on U-and E-service, science and technology, pp 161–168
Maji H et al (2011) Attribute-based signatures, Cryptographers’ track at the RSA conference, pp 376–392
Zhang F et al (2004) An efficient signature scheme from bilinear pairings and its applications. In: International workshop on public key cryptography, pp 277–290
Yacobi Y (2002) A note on the bilinear Diffie-Hellman assumption. IACR Cryptology ePrint Archive
Ateniese G et al (2005) Practical group signatures without random oracles. IACR Cryptology ePrint Archive
Beimel A et al (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science
Rabin Michael O (2005) How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive
Goldreich O (1998) Secure multi-party computation, manuscript, preliminary version 78
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bakshi, P., Nandi, S. (2022). Privacy Enhanced Registered Devices for Fine-Grained Access Control. In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics. Lecture Notes in Electrical Engineering, vol 869. Springer, Singapore. https://doi.org/10.1007/978-981-19-0019-8_48
Download citation
DOI: https://doi.org/10.1007/978-981-19-0019-8_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0018-1
Online ISBN: 978-981-19-0019-8
eBook Packages: EngineeringEngineering (R0)