An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

  • Huihui Yang
  • Vladimir A. Oleshchuk
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9417)


Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a different attribute tree for each signature generation and verification, which is called “onetime” attribute tree in this paper.


Attribute-Based Authentication ABA Traceability Attribute tree 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Bellare, M., Goldreich, O.: Proving computational ability. In: Goldreich, O. (ed.) Studies in Complexity and Cryptography. LNCS, vol. 6650, pp. 6–12. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  3. 3.
    Boneh, D.: Pairing-based cryptography: past, present, and future. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, p. 1. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  4. 4.
    Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  5. 5.
    Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol. 396, pp. 34–52. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  6. 6.
    Cao, D., Zhao, B., Wang, X., Su, J., Chen, Y.: Authenticating with attributes in online social networks. In: 2011 14th International Conference on Network-Based Information Systems (NBiS), pp. 607–611 (2011)Google Scholar
  7. 7.
    Emura, K., Miyaji, A., Omote, K.: A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics. In: 2009 International Conference on Availability, Reliability and Security (ARES 2009), pp. 487–492, March 2009Google Scholar
  8. 8.
    Gorantla, M.C., Boyd, C., Nieto, J.M.G.: Attribute-based authenticated key exchange. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 300–317. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  9. 9.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM, New York (2006)Google Scholar
  10. 10.
    Granboulan, L.: Short signatures in the random oracle model. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 364–378. Springer, Heidelberg (2002) CrossRefGoogle Scholar
  11. 11.
    Horváth, M.: Attribute-based encryption optimized for cloud computing. In: Italiano, G.F., Margaria-Steffen, T., Pokorný, J., Quisquater, J.-J., Wattenhofer, R. (eds.) SOFSEM 2015-Testing. LNCS, vol. 8939, pp. 566–577. Springer, Heidelberg (2015) Google Scholar
  12. 12.
    Rannenberg, K., Camenisch, J., Sabouri, A. (eds.): Attribute-based Credentials for Trust (2015).Google Scholar
  13. 13.
    Katz, J.: The random oracle model. In: Digital Signatures, pp. 135–142. Springer US (2010)Google Scholar
  14. 14.
    Dalia, Khader, D.: Attribute-based Authentication Scheme. Ph.D thesis, University of Bath (2009)Google Scholar
  15. 15.
    Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  16. 16.
    Naruse, T., Mohri, M., Shiraishi, Y.: Attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. In: Park, J.J.J.H., Stojmenovic, I., Choi, M., Xhafa, F. (eds.) Future Information Technology. LNEE, vol. 276, pp. 119–125. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  17. 17.
    Sabouri, A., Bjones, R.: Privacy-ABCs to leverage identity management as a service. In: Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, vol. 8450, pp. 143–153. Springer, Heidelberg (2014) Google Scholar
  18. 18.
    Sabouri, A., Krontiris, I., Rannenberg, K.: Trust relationships in privacy-ABCs’ ecosystems. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds.) TrustBus 2014. LNCS, vol. 8647, pp. 13–23. Springer, Heidelberg (2014) Google Scholar
  19. 19.
    Sabouri, A., Rannenberg, K.: ABC4Trust: protecting privacy in identity management by bringing privacy-ABCs into real-life. In: Camenisch, J., Fischer-Hübner, S., Hansen, M. (eds.) Privacy and Identity 2014. IFIP AICT, vol. 457, pp. 3–16. Springer, Heidelberg (2015) CrossRefGoogle Scholar
  20. 20.
    Wan, Z., Liu, J.E., Deng, R.H.: HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Transactions on Information Forensics and Security 7(2), 743–754 (2012)CrossRefGoogle Scholar
  21. 21.
    Yang, H., Oleshchuk, V.A.: A dynamic attribute-based authentication scheme. In: El Hajji, S., Nitaj, A., Carlet, C., Souidi, E.M. (eds.) Codes, Cryptology, and Information Security. LNCS, vol. 9084, pp. 106–118. Springer, Heidelberg (2015) Google Scholar
  22. 22.
    Zhu, S., Zhan, L., Qiang, H., Fu, D., Sun, W., Tang, Y.: A fuzzy attribute-based authentication scheme on the basis of lagrange polynomial interpolation. In: Zu, Q., Hu, B., Gu, N., Seng, S. (eds.) HCC 2014. LNCS, vol. 8944, pp. 685–692. Springer, Heidelberg (2015) Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Huihui Yang
    • 1
  • Vladimir A. Oleshchuk
    • 1
  1. 1.Department of Information and Communication TechnologyUniversity of AgderKristiansandNorway

Personalised recommendations