HCC 2014: Human Centered Computing pp 685-692 | Cite as

A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation

  • Shuhua Zhu
  • Li Zhan
  • Hengchang Qiang
  • Danlong Fu
  • Wei Sun
  • Yong Tang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8944)

Abstract

Attribute-based encryption algorithm has been widely used to design mechanisms for access control and signature. The algorithm can also be introduced to the study of the authentication scheme and provides users with more flexibility and richer in descriptions. Based on Shamir’s Lagrange Polynomial Interpolation, we proposed a fuzzy attribute-based authentication scheme that enables the users to be authenticated only if their attributes satisfy the authorized attributes, aiming to design a flexible and safe attribute authentication scheme that uses fewer system resources for multi-networks’ users wireless roaming. Analyses have indicated that this scheme can resist the man-in-the-middle attacks, replay attacks and collusion attacks.

Keywords

Authentication Fuzzy attributes Lagrange polynomial interpolation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
  3. 3.
    Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE of INFOCOM, pp. 1–9. IEEE (2010)Google Scholar
  4. 4.
    Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  5. 5.
    Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  6. 6.
    Erber, R., Schlager, C., Pernul, G.: Patterns for authentication and authorisation infrastructures. In: 18th International Workshop on Database and Expert Systems Applications, 2007, DEXA’07, pp. 755–759. IEEE (2007)Google Scholar
  7. 7.
    Barua, M., Liang, X., Lu, R.: Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 970–975. IEEE (2011)Google Scholar
  8. 8.
    Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 47–52. ACM (2010)Google Scholar
  9. 9.
    Guo, L., Zhang, C., Sun, J.: PAAS: A privacy-preserving attribute-based authentication system for ehealth networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 224–233. IEEE (2012)Google Scholar
  10. 10.
    Batina, L., Hoepman, J.-H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 209–222. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Kiyomoto, S., Fukushima, K., Tanaka, T.: Design of anonymous attribute authentication mechanism. IEICE Transactions on Communications 92(4), 1112–1118 (2009)CrossRefGoogle Scholar
  12. 12.
    Haeryong, P.: Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme. IEICE Transactions on Communications 92(9), 2946–2947 (2009)Google Scholar
  13. 13.
    Du, S., Wang, S.: Property-based chameleon remote attestation. Computer Engineering and Design 33(11), 4081–4085 (2012)MathSciNetGoogle Scholar
  14. 14.
    Liu, J., Wang, J., Zhuang, Y.: Fuzzy attribute authentication scheme based on vector space. Computer Engineering and Applications 48(19) (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Shuhua Zhu
    • 1
    • 2
  • Li Zhan
    • 2
  • Hengchang Qiang
    • 2
  • Danlong Fu
    • 2
  • Wei Sun
    • 1
  • Yong Tang
    • 3
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouChina
  2. 2.School of Information Science and TechnologyJinan UniversityGuangzhouChina
  3. 3.School of Computer ScienceSouth China Normal UniversityGuangzhouChina

Personalised recommendations