HCC 2014: Human Centered Computing pp 685-692 | Cite as
A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation
Abstract
Attribute-based encryption algorithm has been widely used to design mechanisms for access control and signature. The algorithm can also be introduced to the study of the authentication scheme and provides users with more flexibility and richer in descriptions. Based on Shamir’s Lagrange Polynomial Interpolation, we proposed a fuzzy attribute-based authentication scheme that enables the users to be authenticated only if their attributes satisfy the authorized attributes, aiming to design a flexible and safe attribute authentication scheme that uses fewer system resources for multi-networks’ users wireless roaming. Analyses have indicated that this scheme can resist the man-in-the-middle attacks, replay attacks and collusion attacks.
Keywords
Authentication Fuzzy attributes Lagrange polynomial interpolationPreview
Unable to display preview. Download preview PDF.
References
- 1.Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 2.Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
- 3.Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE of INFOCOM, pp. 1–9. IEEE (2010)Google Scholar
- 4.Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 5.Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248–265. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 6.Erber, R., Schlager, C., Pernul, G.: Patterns for authentication and authorisation infrastructures. In: 18th International Workshop on Database and Expert Systems Applications, 2007, DEXA’07, pp. 755–759. IEEE (2007)Google Scholar
- 7.Barua, M., Liang, X., Lu, R.: Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 970–975. IEEE (2011)Google Scholar
- 8.Narayan, S., Gagné, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 47–52. ACM (2010)Google Scholar
- 9.Guo, L., Zhang, C., Sun, J.: PAAS: A privacy-preserving attribute-based authentication system for ehealth networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 224–233. IEEE (2012)Google Scholar
- 10.Batina, L., Hoepman, J.-H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 209–222. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 11.Kiyomoto, S., Fukushima, K., Tanaka, T.: Design of anonymous attribute authentication mechanism. IEICE Transactions on Communications 92(4), 1112–1118 (2009)CrossRefGoogle Scholar
- 12.Haeryong, P.: Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme. IEICE Transactions on Communications 92(9), 2946–2947 (2009)Google Scholar
- 13.Du, S., Wang, S.: Property-based chameleon remote attestation. Computer Engineering and Design 33(11), 4081–4085 (2012)MathSciNetGoogle Scholar
- 14.Liu, J., Wang, J., Zhuang, Y.: Fuzzy attribute authentication scheme based on vector space. Computer Engineering and Applications 48(19) (2012)Google Scholar