Survey and new idea for attribute-based identification scheme secure against reset attacks

Ji Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee Huay Heng, Raphael Phan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the other-hand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In this paper, we report on the developments in the area of reset attacks for identification schemes as well as for attribute-based identification schemes. Then we put together a new idea to construct attribute-based identification schemes secure against reset attacks.

Original languageEnglish
Title of host publicationConference Proceedings - Cryptology 2014
Subtitle of host publicationProceedings of the 4th International Cryptology and Information Security Conference 2014
EditorsAinuddin Wahid Abdul Wahab, Hailiza Kamarul Haili, Ji-Jian Chin, Moesfa Soeheila Mohamad, Shekh Faisal Abdul Latip, Miin Huey Ang, Muhammad Reza Za'ba, Muhammad Rezal Kamel Ariffin, Faridah Yunos, Swee-Huay Heng, Bok Min Goi, Rabiah Ahmad, Yanbin Pan, Mohamad Rushdan Md. Said
PublisherInstitute for Mathematical Research (INSPEM)
Pages39-47
Number of pages9
ISBN (Electronic)9789834406943
Publication statusPublished - Jan 1 2014
Event4th International Cryptology and Information Security Conference 2014, Cryptology 2014 - Putrajaya, Malaysia
Duration: Jun 24 2014Jun 26 2014

Publication series

NameConference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014

Other

Other4th International Cryptology and Information Security Conference 2014, Cryptology 2014
CountryMalaysia
CityPutrajaya
Period6/24/146/26/14

Fingerprint

Cryptography
Authentication

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems

Cite this

Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H., & Phan, R. (2014). Survey and new idea for attribute-based identification scheme secure against reset attacks. In A. W. A. Wahab, H. K. Haili, J-J. Chin, M. S. Mohamad, S. F. A. Latip, M. H. Ang, M. R. Za'ba, M. R. K. Ariffin, F. Yunos, S-H. Heng, B. M. Goi, R. Ahmad, Y. Pan, ... M. R. M. Said (Eds.), Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014 (pp. 39-47). (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014). Institute for Mathematical Research (INSPEM).

Survey and new idea for attribute-based identification scheme secure against reset attacks. / Chin, Ji Jian; Anada, Hiroaki; Arita, Seiko; Sakurai, Kouichi; Heng, Swee Huay; Phan, Raphael.

Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. ed. / Ainuddin Wahid Abdul Wahab; Hailiza Kamarul Haili; Ji-Jian Chin; Moesfa Soeheila Mohamad; Shekh Faisal Abdul Latip; Miin Huey Ang; Muhammad Reza Za'ba; Muhammad Rezal Kamel Ariffin; Faridah Yunos; Swee-Huay Heng; Bok Min Goi; Rabiah Ahmad; Yanbin Pan; Mohamad Rushdan Md. Said. Institute for Mathematical Research (INSPEM), 2014. p. 39-47 (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chin, JJ, Anada, H, Arita, S, Sakurai, K, Heng, SH & Phan, R 2014, Survey and new idea for attribute-based identification scheme secure against reset attacks. in AWA Wahab, HK Haili, J-J Chin, MS Mohamad, SFA Latip, MH Ang, MR Za'ba, MRK Ariffin, F Yunos, S-H Heng, BM Goi, R Ahmad, Y Pan & MRM Said (eds), Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014, Institute for Mathematical Research (INSPEM), pp. 39-47, 4th International Cryptology and Information Security Conference 2014, Cryptology 2014, Putrajaya, Malaysia, 6/24/14.
Chin JJ, Anada H, Arita S, Sakurai K, Heng SH, Phan R. Survey and new idea for attribute-based identification scheme secure against reset attacks. In Wahab AWA, Haili HK, Chin J-J, Mohamad MS, Latip SFA, Ang MH, Za'ba MR, Ariffin MRK, Yunos F, Heng S-H, Goi BM, Ahmad R, Pan Y, Said MRM, editors, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM). 2014. p. 39-47. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).
Chin, Ji Jian ; Anada, Hiroaki ; Arita, Seiko ; Sakurai, Kouichi ; Heng, Swee Huay ; Phan, Raphael. / Survey and new idea for attribute-based identification scheme secure against reset attacks. Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. editor / Ainuddin Wahid Abdul Wahab ; Hailiza Kamarul Haili ; Ji-Jian Chin ; Moesfa Soeheila Mohamad ; Shekh Faisal Abdul Latip ; Miin Huey Ang ; Muhammad Reza Za'ba ; Muhammad Rezal Kamel Ariffin ; Faridah Yunos ; Swee-Huay Heng ; Bok Min Goi ; Rabiah Ahmad ; Yanbin Pan ; Mohamad Rushdan Md. Said. Institute for Mathematical Research (INSPEM), 2014. pp. 39-47 (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).
@inproceedings{b7f81fb3385249c4889af23bcc2786ad,
title = "Survey and new idea for attribute-based identification scheme secure against reset attacks",
abstract = "Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the other-hand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In this paper, we report on the developments in the area of reset attacks for identification schemes as well as for attribute-based identification schemes. Then we put together a new idea to construct attribute-based identification schemes secure against reset attacks.",
author = "Chin, {Ji Jian} and Hiroaki Anada and Seiko Arita and Kouichi Sakurai and Heng, {Swee Huay} and Raphael Phan",
year = "2014",
month = "1",
day = "1",
language = "English",
series = "Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014",
publisher = "Institute for Mathematical Research (INSPEM)",
pages = "39--47",
editor = "Wahab, {Ainuddin Wahid Abdul} and Haili, {Hailiza Kamarul} and Ji-Jian Chin and Mohamad, {Moesfa Soeheila} and Latip, {Shekh Faisal Abdul} and Ang, {Miin Huey} and Za'ba, {Muhammad Reza} and Ariffin, {Muhammad Rezal Kamel} and Faridah Yunos and Swee-Huay Heng and Goi, {Bok Min} and Rabiah Ahmad and Yanbin Pan and Said, {Mohamad Rushdan Md.}",
booktitle = "Conference Proceedings - Cryptology 2014",

}

TY - GEN

T1 - Survey and new idea for attribute-based identification scheme secure against reset attacks

AU - Chin, Ji Jian

AU - Anada, Hiroaki

AU - Arita, Seiko

AU - Sakurai, Kouichi

AU - Heng, Swee Huay

AU - Phan, Raphael

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the other-hand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In this paper, we report on the developments in the area of reset attacks for identification schemes as well as for attribute-based identification schemes. Then we put together a new idea to construct attribute-based identification schemes secure against reset attacks.

AB - Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the other-hand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In this paper, we report on the developments in the area of reset attacks for identification schemes as well as for attribute-based identification schemes. Then we put together a new idea to construct attribute-based identification schemes secure against reset attacks.

UR - http://www.scopus.com/inward/record.url?scp=84923145155&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84923145155&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84923145155

T3 - Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014

SP - 39

EP - 47

BT - Conference Proceedings - Cryptology 2014

A2 - Wahab, Ainuddin Wahid Abdul

A2 - Haili, Hailiza Kamarul

A2 - Chin, Ji-Jian

A2 - Mohamad, Moesfa Soeheila

A2 - Latip, Shekh Faisal Abdul

A2 - Ang, Miin Huey

A2 - Za'ba, Muhammad Reza

A2 - Ariffin, Muhammad Rezal Kamel

A2 - Yunos, Faridah

A2 - Heng, Swee-Huay

A2 - Goi, Bok Min

A2 - Ahmad, Rabiah

A2 - Pan, Yanbin

A2 - Said, Mohamad Rushdan Md.

PB - Institute for Mathematical Research (INSPEM)

ER -