Multi-authority attribute-based identification scheme
Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key g...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021047/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539321396461568 |
---|---|
author | Fei TANG Jiali BAO Yonghong HUANG Dong HUANG Huili WANG |
author_facet | Fei TANG Jiali BAO Yonghong HUANG Dong HUANG Huili WANG |
author_sort | Fei TANG |
collection | DOAJ |
description | Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance. |
format | Article |
id | doaj-art-fd9387edceb74ff19683d0b6dfaa2d3b |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2021-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-fd9387edceb74ff19683d0b6dfaa2d3b2025-01-14T07:21:53ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-03-014222022859741146Multi-authority attribute-based identification schemeFei TANGJiali BAOYonghong HUANGDong HUANGHuili WANGBased on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021047/identificationattribute-based cryptographymulti-authoritydistributed key generation |
spellingShingle | Fei TANG Jiali BAO Yonghong HUANG Dong HUANG Huili WANG Multi-authority attribute-based identification scheme Tongxin xuebao identification attribute-based cryptography multi-authority distributed key generation |
title | Multi-authority attribute-based identification scheme |
title_full | Multi-authority attribute-based identification scheme |
title_fullStr | Multi-authority attribute-based identification scheme |
title_full_unstemmed | Multi-authority attribute-based identification scheme |
title_short | Multi-authority attribute-based identification scheme |
title_sort | multi authority attribute based identification scheme |
topic | identification attribute-based cryptography multi-authority distributed key generation |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021047/ |
work_keys_str_mv | AT feitang multiauthorityattributebasedidentificationscheme AT jialibao multiauthorityattributebasedidentificationscheme AT yonghonghuang multiauthorityattributebasedidentificationscheme AT donghuang multiauthorityattributebasedidentificationscheme AT huiliwang multiauthorityattributebasedidentificationscheme |