Skip to main content

Privacy Enhanced Registered Devices for Fine-Grained Access Control

  • Conference paper
  • First Online:
Edge Analytics

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 869))

  • 533 Accesses

Abstract

Aadhaar is one of the largest biometric identity systems in the world which aims to assign a unique digital identity to each resident of India. A resident can authenticate himself using his Aadhaar number and a biometric. Biometric is a very sensitive data, and registered devices were introduced to eliminate the use of stored biometrics. Each registered device is supposed to have a unique identity and to follow suggested best practices to ensure security. With the proliferation of digital services, the use of registered devices is expected to grow more in near future. Although registered device is a good initiative, attribute-based access and communication may not be very efficient at present. In the present world of ubiquitous computing, IoT and 5G, a device may need to provide an assurance that it possesses a certain set of requisite attributes rather than some serial or a model number. Furthermore, owner of the device may not want to reveal device identity to protect his privacy since device identity may be correlated with owner’s identity. In this paper, we present an efficient scheme of privacy enhanced attribute-based registered devices for fine-grained access control using attribute-based signature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. UIDAI, About UIDAI (2009) https://uidai.gov.in/about-uidai.html

  2. Banerjee S (2016) Aadhaar: Digital inclusion and public services in India. World Development Report, pp 81–92

    Google Scholar 

  3. UIDAI, Annual Report 2018-19 (2019) https://uidai.gov.in/images/AADHAR_AR_2018_19_ENG_approved.pdf

  4. UIDAI, Aadhaar eKYC API Specification, v2.1 (2017) https://uidai.gov.in/images/resource/aadhaar_ekyc_api_2_1.pdf

  5. MeitY, Digital Locker Technical Specification, v2.3 (2015) https://img1.digitallocker.gov.in/assets/img/technical-specifications-dlts-ver-2.3.pdf

  6. CCA, eSign API Specifications v3.2 (2019) http://cca.gov.in/sites/files/pdf/esign/eSign-APIv3.2.pdf

  7. UIDAI, Aadhaar Registered Devices Technical Specification v2.0 (2019) https://uidai.gov.in/images/resource/Aadhaar_Registered_Devices_2_0_4.pdf

  8. UIDAI, Aadhaar Authentication API Specification v2.0 (2017) https://uidai.gov.in/images/FrontPageUpdates/aadhaar_authentication_api_2_0.pdf

  9. Shanqing G, Yingpei Z (2008) Attribute-based signature scheme. In: International conference on information security and assurance

    Google Scholar 

  10. Whitfield D, Hellman M (1976) New directions in cryptography. In: IEEE transactions on information theory, pp 644–654

    Google Scholar 

  11. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Theory and application of cryptographic techniques workshop, pp 47–53

    Google Scholar 

  12. Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. Int Cryptology Conf 213–229

    Google Scholar 

  13. Goyal V et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: 13th ACM conference proceedings on computer and communications security, pp 89-98

    Google Scholar 

  14. Bethencourt J et al (2007) Ciphertext-policy attribute-based encryption. In: Symposium on security and privacy, pp 321–334

    Google Scholar 

  15. Shanqing G, Yingpei Z (2008) Attribute-based signature scheme. In: International conference on information security and assurance, pp 509–511

    Google Scholar 

  16. Tan S et al (2009) On the security of an attribute-based signature scheme. In: International conference on U-and E-service, science and technology, pp 161–168

    Google Scholar 

  17. Maji H et al (2011) Attribute-based signatures, Cryptographers’ track at the RSA conference, pp 376–392

    Google Scholar 

  18. Zhang F et al (2004) An efficient signature scheme from bilinear pairings and its applications. In: International workshop on public key cryptography, pp 277–290

    Google Scholar 

  19. Yacobi Y (2002) A note on the bilinear Diffie-Hellman assumption. IACR Cryptology ePrint Archive

    Google Scholar 

  20. Ateniese G et al (2005) Practical group signatures without random oracles. IACR Cryptology ePrint Archive

    Google Scholar 

  21. Beimel A et al (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science

    Google Scholar 

  22. Rabin Michael O (2005) How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive

    Google Scholar 

  23. Goldreich O (1998) Secure multi-party computation, manuscript, preliminary version 78

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Puneet Bakshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bakshi, P., Nandi, S. (2022). Privacy Enhanced Registered Devices for Fine-Grained Access Control. In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics. Lecture Notes in Electrical Engineering, vol 869. Springer, Singapore. https://doi.org/10.1007/978-981-19-0019-8_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0019-8_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0018-1

  • Online ISBN: 978-981-19-0019-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics