Survey and new idea for attribute-based identification scheme secure against reset attacks

Ji Jian Chin, Hiroaki Anada, Seiko Arita, Kouichi Sakurai, Swee Huay Heng, Raphael Phan

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

Identification schemes are a common one-way authentication technique for a user to prove himself securely to a verifier. However, it is known that identification schemes based on the sigma-protocol are basically insecure against reset attacks. On the other-hand, attribute-based cryptography is a technique which allows for the secure implementation of access policies within a cryptosystem. In this paper, we report on the developments in the area of reset attacks for identification schemes as well as for attribute-based identification schemes. Then we put together a new idea to construct attribute-based identification schemes secure against reset attacks.

Original languageEnglish
Title of host publicationConference Proceedings - Cryptology 2014
Subtitle of host publicationProceedings of the 4th International Cryptology and Information Security Conference 2014
EditorsAinuddin Wahid Abdul Wahab, Hailiza Kamarul Haili, Ji-Jian Chin, Moesfa Soeheila Mohamad, Shekh Faisal Abdul Latip, Miin Huey Ang, Muhammad Reza Za'ba, Muhammad Rezal Kamel Ariffin, Faridah Yunos, Swee-Huay Heng, Bok Min Goi, Rabiah Ahmad, Yanbin Pan, Mohamad Rushdan Md. Said
PublisherInstitute for Mathematical Research (INSPEM)
Pages39-47
Number of pages9
ISBN (Electronic)9789834406943
Publication statusPublished - 2014
Externally publishedYes
EventInternational Cryptology and Information Security Conference 2014 - Putrajaya, Malaysia
Duration: 24 Jun 201426 Jun 2014
Conference number: 4th
https://einspem.upm.edu.my/cryptology2014/

Conference

ConferenceInternational Cryptology and Information Security Conference 2014
Abbreviated titleCryptology 2014
CountryMalaysia
CityPutrajaya
Period24/06/1426/06/14
Internet address

Keywords

  • Attribute-based
  • Identification
  • Reset-attacks

Cite this