Survey and new idea for attribute-based identification scheme secure against reset attacks

Ji Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee Huay Heng, Raphael Phan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the other-hand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In this paper, we report on the developments in the area of reset attacks for identification schemes as well as for attribute-based identification schemes. Then we put together a new idea to construct attribute-based identification schemes secure against reset attacks.

Original languageEnglish
Title of host publicationConference Proceedings - Cryptology 2014
Subtitle of host publicationProceedings of the 4th International Cryptology and Information Security Conference 2014
EditorsAinuddin Wahid Abdul Wahab, Hailiza Kamarul Haili, Ji-Jian Chin, Moesfa Soeheila Mohamad, Shekh Faisal Abdul Latip, Miin Huey Ang, Muhammad Reza Za'ba, Muhammad Rezal Kamel Ariffin, Faridah Yunos, Swee-Huay Heng, Bok Min Goi, Rabiah Ahmad, Yanbin Pan, Mohamad Rushdan Md. Said
PublisherInstitute for Mathematical Research (INSPEM)
Pages39-47
Number of pages9
ISBN (Electronic)9789834406943
Publication statusPublished - Jan 1 2014
Event4th International Cryptology and Information Security Conference 2014, Cryptology 2014 - Putrajaya, Malaysia
Duration: Jun 24 2014Jun 26 2014

Publication series

NameConference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014

Other

Other4th International Cryptology and Information Security Conference 2014, Cryptology 2014
CountryMalaysia
CityPutrajaya
Period6/24/146/26/14

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems

Fingerprint Dive into the research topics of 'Survey and new idea for attribute-based identification scheme secure against reset attacks'. Together they form a unique fingerprint.

  • Cite this

    Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H., & Phan, R. (2014). Survey and new idea for attribute-based identification scheme secure against reset attacks. In A. W. A. Wahab, H. K. Haili, J-J. Chin, M. S. Mohamad, S. F. A. Latip, M. H. Ang, M. R. Za'ba, M. R. K. Ariffin, F. Yunos, S-H. Heng, B. M. Goi, R. Ahmad, Y. Pan, & M. R. M. Said (Eds.), Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014 (pp. 39-47). (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014). Institute for Mathematical Research (INSPEM).