An improved fuzzy attribute-based authentication

Jong Pil Yun, Hyoseung Kim, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.

Original languageEnglish
Title of host publication2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781467365376
DOIs
Publication statusPublished - 2015 Oct 5
Event5th International Conference on IT Convergence and Security, ICITCS 2015 - Kuala Lumpur, Malaysia
Duration: 2015 Aug 242015 Aug 27

Other

Other5th International Conference on IT Convergence and Security, ICITCS 2015
CountryMalaysia
CityKuala Lumpur
Period15/8/2415/8/27

Fingerprint

Authentication
Cryptography
Interpolation
Polynomials

Keywords

  • Authentication
  • Cryptography
  • Interpolation
  • Polynomials
  • Protocols
  • Resistance

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing

Cite this

Yun, J. P., Kim, H., & Lee, D. H. (2015). An improved fuzzy attribute-based authentication. In 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings [7292946] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITCS.2015.7292946

An improved fuzzy attribute-based authentication. / Yun, Jong Pil; Kim, Hyoseung; Lee, Dong Hoon.

2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2015. 7292946.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yun, JP, Kim, H & Lee, DH 2015, An improved fuzzy attribute-based authentication. in 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings., 7292946, Institute of Electrical and Electronics Engineers Inc., 5th International Conference on IT Convergence and Security, ICITCS 2015, Kuala Lumpur, Malaysia, 15/8/24. https://doi.org/10.1109/ICITCS.2015.7292946
Yun JP, Kim H, Lee DH. An improved fuzzy attribute-based authentication. In 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2015. 7292946 https://doi.org/10.1109/ICITCS.2015.7292946
Yun, Jong Pil ; Kim, Hyoseung ; Lee, Dong Hoon. / An improved fuzzy attribute-based authentication. 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2015.
@inproceedings{7d36fa97dd0743fe9f59399eba07cc37,
title = "An improved fuzzy attribute-based authentication",
abstract = "Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.",
keywords = "Authentication, Cryptography, Interpolation, Polynomials, Protocols, Resistance",
author = "Yun, {Jong Pil} and Hyoseung Kim and Lee, {Dong Hoon}",
year = "2015",
month = "10",
day = "5",
doi = "10.1109/ICITCS.2015.7292946",
language = "English",
isbn = "9781467365376",
booktitle = "2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - An improved fuzzy attribute-based authentication

AU - Yun, Jong Pil

AU - Kim, Hyoseung

AU - Lee, Dong Hoon

PY - 2015/10/5

Y1 - 2015/10/5

N2 - Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.

AB - Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.

KW - Authentication

KW - Cryptography

KW - Interpolation

KW - Polynomials

KW - Protocols

KW - Resistance

UR - http://www.scopus.com/inward/record.url?scp=84961711395&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84961711395&partnerID=8YFLogxK

U2 - 10.1109/ICITCS.2015.7292946

DO - 10.1109/ICITCS.2015.7292946

M3 - Conference contribution

AN - SCOPUS:84961711395

SN - 9781467365376

BT - 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -