Academic Journal

Reusable attribute-based signature with attribute revocation and authenticated key agreement

التفاصيل البيبلوغرافية
العنوان: Reusable attribute-based signature with attribute revocation and authenticated key agreement
المؤلفون: Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU
المصدر: 网络与信息安全学报, Vol 10, Iss 2, Pp 81-94 (2024)
بيانات النشر: POSTS&TELECOM PRESS Co., LTD, 2024.
سنة النشر: 2024
المجموعة: LCC:Electronic computers. Computer science
مصطلحات موضوعية: fine-grained access control, attributed hash filter, attributed direct revocation, policy-decoupled attribute-based signature, mutually authenticated key agreement protocol, existentially unforgeable, Electronic computers. Computer science, QA75.5-76.95
الوصف: In the pursuit of establishing a unified model for fine-grained access control and secure data communication within a distributed microservices architecture, a verifier-policy attributed-based signature (VP-ABS) scheme, augmented with attribute revocation and an authenticated key agreement protocol, was proposed. This scheme was underpinned by Type-3 pairing. In this scheme, signatures generated by signers were linked solely to a subset of the signer's attributes and were disassociated from the access policy. This decoupling allowed for the reusability of the signer's signature across multiple access policies. Additionally, an attribute-Hash filter algorithm was introduced to facilitate a direct attribute revocation mechanism within the proposed VP-ABS scheme. This mechanism was designed to prevent users from authenticating with expired attributes. To further secure data communication, a mutually authenticated key agreement protocol was also proposed. This protocol was secure within the framework of the extended Canetti-Krawczyk (eCK) model and was built upon the foundation of the VP-ABS scheme. A rigorous unforgeability proof for the VP-ABS scheme was provided. Ultimately, theoretical comparisons and simulation experiments conducted at a 128-bit advanced encryption standard (AES) security level demonstrated that the proposed attribute-based authentication and secure communication scheme outperforms other contemporary schemes in terms of efficiency.
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
Chinese
تدمد: 2096-109x
2096-109X
Relation: https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2024023; https://doaj.org/toc/2096-109X
DOI: 10.11959/j.issn.2096-109x.2024023
URL الوصول: https://doaj.org/article/f297508c5b584c798a87c0391b953027
رقم الانضمام: edsdoj.f297508c5b584c798a87c0391b953027
قاعدة البيانات: Directory of Open Access Journals
ResultId 1
Header edsdoj
Directory of Open Access Journals
edsdoj.f297508c5b584c798a87c0391b953027
1033
3
Academic Journal
academicJournal
1033.015625
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsdoj&AN=edsdoj.f297508c5b584c798a87c0391b953027&custid=s6537998&authtype=sso
FullText Array ( [Availability] => 0 )
Array ( [0] => Array ( [Url] => https://doaj.org/article/f297508c5b584c798a87c0391b953027 [Name] => EDS - DOAJ [Category] => fullText [Text] => View record in DOAJ [MouseOverText] => View record in DOAJ ) )
Items Array ( [Name] => Title [Label] => Title [Group] => Ti [Data] => Reusable attribute-based signature with attribute revocation and authenticated key agreement )
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Zhishuo+ZHANG%2C+Huixi+YANG%2C+Wen+HUANG%2C+Yongjian+LIAO%2C+Shijie+ZHOU%22">Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU</searchLink> )
Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => 网络与信息安全学报, Vol 10, Iss 2, Pp 81-94 (2024) )
Array ( [Name] => Publisher [Label] => Publisher Information [Group] => PubInfo [Data] => POSTS&TELECOM PRESS Co., LTD, 2024. )
Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2024 )
Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => LCC:Electronic computers. Computer science )
Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22fine-grained+access+control%22">fine-grained access control</searchLink><br /><searchLink fieldCode="DE" term="%22attributed+hash+filter%22">attributed hash filter</searchLink><br /><searchLink fieldCode="DE" term="%22attributed+direct+revocation%22">attributed direct revocation</searchLink><br /><searchLink fieldCode="DE" term="%22policy-decoupled+attribute-based+signature%22">policy-decoupled attribute-based signature</searchLink><br /><searchLink fieldCode="DE" term="%22mutually+authenticated+key+agreement+protocol%22">mutually authenticated key agreement protocol</searchLink><br /><searchLink fieldCode="DE" term="%22existentially+unforgeable%22">existentially unforgeable</searchLink><br /><searchLink fieldCode="DE" term="%22Electronic+computers%2E+Computer+science%22">Electronic computers. Computer science</searchLink><br /><searchLink fieldCode="DE" term="%22QA75%2E5-76%2E95%22">QA75.5-76.95</searchLink> )
Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => In the pursuit of establishing a unified model for fine-grained access control and secure data communication within a distributed microservices architecture, a verifier-policy attributed-based signature (VP-ABS) scheme, augmented with attribute revocation and an authenticated key agreement protocol, was proposed. This scheme was underpinned by Type-3 pairing. In this scheme, signatures generated by signers were linked solely to a subset of the signer's attributes and were disassociated from the access policy. This decoupling allowed for the reusability of the signer's signature across multiple access policies. Additionally, an attribute-Hash filter algorithm was introduced to facilitate a direct attribute revocation mechanism within the proposed VP-ABS scheme. This mechanism was designed to prevent users from authenticating with expired attributes. To further secure data communication, a mutually authenticated key agreement protocol was also proposed. This protocol was secure within the framework of the extended Canetti-Krawczyk (eCK) model and was built upon the foundation of the VP-ABS scheme. A rigorous unforgeability proof for the VP-ABS scheme was provided. Ultimately, theoretical comparisons and simulation experiments conducted at a 128-bit advanced encryption standard (AES) security level demonstrated that the proposed attribute-based authentication and secure communication scheme outperforms other contemporary schemes in terms of efficiency. )
Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => article )
Array ( [Name] => Format [Label] => File Description [Group] => SrcInfo [Data] => electronic resource )
Array ( [Name] => Language [Label] => Language [Group] => Lang [Data] => English<br />Chinese )
Array ( [Name] => ISSN [Label] => ISSN [Group] => ISSN [Data] => 2096-109x<br />2096-109X )
Array ( [Name] => NoteTitleSource [Label] => Relation [Group] => SrcInfo [Data] => https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2024023; https://doaj.org/toc/2096-109X )
Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.11959/j.issn.2096-109x.2024023 )
Array ( [Name] => URL [Label] => Access URL [Group] => URL [Data] => <link linkTarget="URL" linkTerm="https://doaj.org/article/f297508c5b584c798a87c0391b953027" linkWindow="_blank">https://doaj.org/article/f297508c5b584c798a87c0391b953027</link> )
Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsdoj.f297508c5b584c798a87c0391b953027 )
RecordInfo Array ( [BibEntity] => Array ( [Identifiers] => Array ( [0] => Array ( [Type] => doi [Value] => 10.11959/j.issn.2096-109x.2024023 ) ) [Languages] => Array ( [0] => Array ( [Text] => English ) [1] => Array ( [Text] => Chinese ) ) [PhysicalDescription] => Array ( [Pagination] => Array ( [PageCount] => 14 [StartPage] => 81 ) ) [Subjects] => Array ( [0] => Array ( [SubjectFull] => fine-grained access control [Type] => general ) [1] => Array ( [SubjectFull] => attributed hash filter [Type] => general ) [2] => Array ( [SubjectFull] => attributed direct revocation [Type] => general ) [3] => Array ( [SubjectFull] => policy-decoupled attribute-based signature [Type] => general ) [4] => Array ( [SubjectFull] => mutually authenticated key agreement protocol [Type] => general ) [5] => Array ( [SubjectFull] => existentially unforgeable [Type] => general ) [6] => Array ( [SubjectFull] => Electronic computers. Computer science [Type] => general ) [7] => Array ( [SubjectFull] => QA75.5-76.95 [Type] => general ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => Reusable attribute-based signature with attribute revocation and authenticated key agreement [Type] => main ) ) ) [BibRelationships] => Array ( [HasContributorRelationships] => Array ( [0] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU ) ) ) ) [IsPartOfRelationships] => Array ( [0] => Array ( [BibEntity] => Array ( [Dates] => Array ( [0] => Array ( [D] => 01 [M] => 04 [Type] => published [Y] => 2024 ) ) [Identifiers] => Array ( [0] => Array ( [Type] => issn-print [Value] => 2096109x ) [1] => Array ( [Type] => issn-print [Value] => 2096109X ) ) [Numbering] => Array ( [0] => Array ( [Type] => volume [Value] => 10 ) [1] => Array ( [Type] => issue [Value] => 2 ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => 网络与信息安全学报 [Type] => main ) ) ) ) ) ) )
IllustrationInfo