Academic Journal
Reusable attribute-based signature with attribute revocation and authenticated key agreement
العنوان: | Reusable attribute-based signature with attribute revocation and authenticated key agreement |
---|---|
المؤلفون: | Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU |
المصدر: | 网络与信息安全学报, Vol 10, Iss 2, Pp 81-94 (2024) |
بيانات النشر: | POSTS&TELECOM PRESS Co., LTD, 2024. |
سنة النشر: | 2024 |
المجموعة: | LCC:Electronic computers. Computer science |
مصطلحات موضوعية: | fine-grained access control, attributed hash filter, attributed direct revocation, policy-decoupled attribute-based signature, mutually authenticated key agreement protocol, existentially unforgeable, Electronic computers. Computer science, QA75.5-76.95 |
الوصف: | In the pursuit of establishing a unified model for fine-grained access control and secure data communication within a distributed microservices architecture, a verifier-policy attributed-based signature (VP-ABS) scheme, augmented with attribute revocation and an authenticated key agreement protocol, was proposed. This scheme was underpinned by Type-3 pairing. In this scheme, signatures generated by signers were linked solely to a subset of the signer's attributes and were disassociated from the access policy. This decoupling allowed for the reusability of the signer's signature across multiple access policies. Additionally, an attribute-Hash filter algorithm was introduced to facilitate a direct attribute revocation mechanism within the proposed VP-ABS scheme. This mechanism was designed to prevent users from authenticating with expired attributes. To further secure data communication, a mutually authenticated key agreement protocol was also proposed. This protocol was secure within the framework of the extended Canetti-Krawczyk (eCK) model and was built upon the foundation of the VP-ABS scheme. A rigorous unforgeability proof for the VP-ABS scheme was provided. Ultimately, theoretical comparisons and simulation experiments conducted at a 128-bit advanced encryption standard (AES) security level demonstrated that the proposed attribute-based authentication and secure communication scheme outperforms other contemporary schemes in terms of efficiency. |
نوع الوثيقة: | article |
وصف الملف: | electronic resource |
اللغة: | English Chinese |
تدمد: | 2096-109x 2096-109X |
Relation: | https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2024023; https://doaj.org/toc/2096-109X |
DOI: | 10.11959/j.issn.2096-109x.2024023 |
URL الوصول: | https://doaj.org/article/f297508c5b584c798a87c0391b953027 |
رقم الانضمام: | edsdoj.f297508c5b584c798a87c0391b953027 |
قاعدة البيانات: | Directory of Open Access Journals |
ResultId |
1 |
---|---|
Header |
edsdoj Directory of Open Access Journals edsdoj.f297508c5b584c798a87c0391b953027 1033 3 Academic Journal academicJournal 1033.015625 |
PLink |
https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsdoj&AN=edsdoj.f297508c5b584c798a87c0391b953027&custid=s6537998&authtype=sso |
FullText |
Array
(
[Availability] => 0
)
Array ( [0] => Array ( [Url] => https://doaj.org/article/f297508c5b584c798a87c0391b953027 [Name] => EDS - DOAJ [Category] => fullText [Text] => View record in DOAJ [MouseOverText] => View record in DOAJ ) ) |
Items |
Array
(
[Name] => Title
[Label] => Title
[Group] => Ti
[Data] => Reusable attribute-based signature with attribute revocation and authenticated key agreement
)
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Zhishuo+ZHANG%2C+Huixi+YANG%2C+Wen+HUANG%2C+Yongjian+LIAO%2C+Shijie+ZHOU%22">Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU</searchLink> ) Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => 网络与信息安全学报, Vol 10, Iss 2, Pp 81-94 (2024) ) Array ( [Name] => Publisher [Label] => Publisher Information [Group] => PubInfo [Data] => POSTS&TELECOM PRESS Co., LTD, 2024. ) Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2024 ) Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => LCC:Electronic computers. Computer science ) Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22fine-grained+access+control%22">fine-grained access control</searchLink><br /><searchLink fieldCode="DE" term="%22attributed+hash+filter%22">attributed hash filter</searchLink><br /><searchLink fieldCode="DE" term="%22attributed+direct+revocation%22">attributed direct revocation</searchLink><br /><searchLink fieldCode="DE" term="%22policy-decoupled+attribute-based+signature%22">policy-decoupled attribute-based signature</searchLink><br /><searchLink fieldCode="DE" term="%22mutually+authenticated+key+agreement+protocol%22">mutually authenticated key agreement protocol</searchLink><br /><searchLink fieldCode="DE" term="%22existentially+unforgeable%22">existentially unforgeable</searchLink><br /><searchLink fieldCode="DE" term="%22Electronic+computers%2E+Computer+science%22">Electronic computers. Computer science</searchLink><br /><searchLink fieldCode="DE" term="%22QA75%2E5-76%2E95%22">QA75.5-76.95</searchLink> ) Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => In the pursuit of establishing a unified model for fine-grained access control and secure data communication within a distributed microservices architecture, a verifier-policy attributed-based signature (VP-ABS) scheme, augmented with attribute revocation and an authenticated key agreement protocol, was proposed. This scheme was underpinned by Type-3 pairing. In this scheme, signatures generated by signers were linked solely to a subset of the signer's attributes and were disassociated from the access policy. This decoupling allowed for the reusability of the signer's signature across multiple access policies. Additionally, an attribute-Hash filter algorithm was introduced to facilitate a direct attribute revocation mechanism within the proposed VP-ABS scheme. This mechanism was designed to prevent users from authenticating with expired attributes. To further secure data communication, a mutually authenticated key agreement protocol was also proposed. This protocol was secure within the framework of the extended Canetti-Krawczyk (eCK) model and was built upon the foundation of the VP-ABS scheme. A rigorous unforgeability proof for the VP-ABS scheme was provided. Ultimately, theoretical comparisons and simulation experiments conducted at a 128-bit advanced encryption standard (AES) security level demonstrated that the proposed attribute-based authentication and secure communication scheme outperforms other contemporary schemes in terms of efficiency. ) Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => article ) Array ( [Name] => Format [Label] => File Description [Group] => SrcInfo [Data] => electronic resource ) Array ( [Name] => Language [Label] => Language [Group] => Lang [Data] => English<br />Chinese ) Array ( [Name] => ISSN [Label] => ISSN [Group] => ISSN [Data] => 2096-109x<br />2096-109X ) Array ( [Name] => NoteTitleSource [Label] => Relation [Group] => SrcInfo [Data] => https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2024023; https://doaj.org/toc/2096-109X ) Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.11959/j.issn.2096-109x.2024023 ) Array ( [Name] => URL [Label] => Access URL [Group] => URL [Data] => <link linkTarget="URL" linkTerm="https://doaj.org/article/f297508c5b584c798a87c0391b953027" linkWindow="_blank">https://doaj.org/article/f297508c5b584c798a87c0391b953027</link> ) Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsdoj.f297508c5b584c798a87c0391b953027 ) |
RecordInfo |
Array
(
[BibEntity] => Array
(
[Identifiers] => Array
(
[0] => Array
(
[Type] => doi
[Value] => 10.11959/j.issn.2096-109x.2024023
)
)
[Languages] => Array
(
[0] => Array
(
[Text] => English
)
[1] => Array
(
[Text] => Chinese
)
)
[PhysicalDescription] => Array
(
[Pagination] => Array
(
[PageCount] => 14
[StartPage] => 81
)
)
[Subjects] => Array
(
[0] => Array
(
[SubjectFull] => fine-grained access control
[Type] => general
)
[1] => Array
(
[SubjectFull] => attributed hash filter
[Type] => general
)
[2] => Array
(
[SubjectFull] => attributed direct revocation
[Type] => general
)
[3] => Array
(
[SubjectFull] => policy-decoupled attribute-based signature
[Type] => general
)
[4] => Array
(
[SubjectFull] => mutually authenticated key agreement protocol
[Type] => general
)
[5] => Array
(
[SubjectFull] => existentially unforgeable
[Type] => general
)
[6] => Array
(
[SubjectFull] => Electronic computers. Computer science
[Type] => general
)
[7] => Array
(
[SubjectFull] => QA75.5-76.95
[Type] => general
)
)
[Titles] => Array
(
[0] => Array
(
[TitleFull] => Reusable attribute-based signature with attribute revocation and authenticated key agreement
[Type] => main
)
)
)
[BibRelationships] => Array
(
[HasContributorRelationships] => Array
(
[0] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU
)
)
)
)
[IsPartOfRelationships] => Array
(
[0] => Array
(
[BibEntity] => Array
(
[Dates] => Array
(
[0] => Array
(
[D] => 01
[M] => 04
[Type] => published
[Y] => 2024
)
)
[Identifiers] => Array
(
[0] => Array
(
[Type] => issn-print
[Value] => 2096109x
)
[1] => Array
(
[Type] => issn-print
[Value] => 2096109X
)
)
[Numbering] => Array
(
[0] => Array
(
[Type] => volume
[Value] => 10
)
[1] => Array
(
[Type] => issue
[Value] => 2
)
)
[Titles] => Array
(
[0] => Array
(
[TitleFull] => 网络与信息安全学报
[Type] => main
)
)
)
)
)
)
)
|
IllustrationInfo |