Survey and new idea for attribute-based identification scheme secure against reset attacks

Ji Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee Huay Heng, Raphael Phan

研究成果: 著書/レポートタイプへの貢献会議での発言

抜粋

Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the other-hand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In this paper, we report on the developments in the area of reset attacks for identification schemes as well as for attribute-based identification schemes. Then we put together a new idea to construct attribute-based identification schemes secure against reset attacks.

元の言語英語
ホスト出版物のタイトルConference Proceedings - Cryptology 2014
ホスト出版物のサブタイトルProceedings of the 4th International Cryptology and Information Security Conference 2014
編集者Ainuddin Wahid Abdul Wahab, Hailiza Kamarul Haili, Ji-Jian Chin, Moesfa Soeheila Mohamad, Shekh Faisal Abdul Latip, Miin Huey Ang, Muhammad Reza Za'ba, Muhammad Rezal Kamel Ariffin, Faridah Yunos, Swee-Huay Heng, Bok Min Goi, Rabiah Ahmad, Yanbin Pan, Mohamad Rushdan Md. Said
出版者Institute for Mathematical Research (INSPEM)
ページ39-47
ページ数9
ISBN(電子版)9789834406943
出版物ステータス出版済み - 1 1 2014
イベント4th International Cryptology and Information Security Conference 2014, Cryptology 2014 - Putrajaya, マレーシア
継続期間: 6 24 20146 26 2014

出版物シリーズ

名前Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014

その他

その他4th International Cryptology and Information Security Conference 2014, Cryptology 2014
マレーシア
Putrajaya
期間6/24/146/26/14

    フィンガープリント

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems

これを引用

Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H., & Phan, R. (2014). Survey and new idea for attribute-based identification scheme secure against reset attacks. : A. W. A. Wahab, H. K. Haili, J-J. Chin, M. S. Mohamad, S. F. A. Latip, M. H. Ang, M. R. Za'ba, M. R. K. Ariffin, F. Yunos, S-H. Heng, B. M. Goi, R. Ahmad, Y. Pan, ... M. R. M. Said (版), Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014 (pp. 39-47). (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014). Institute for Mathematical Research (INSPEM).