@inproceedings{7d36fa97dd0743fe9f59399eba07cc37,
title = "An improved fuzzy attribute-based authentication",
abstract = "Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.",
keywords = "Authentication, Cryptography, Interpolation, Polynomials, Protocols, Resistance",
author = "Yun, {Jong Pil} and Hyoseung Kim and Lee, {Dong Hoon}",
note = "Funding Information: This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MEST) (No. 2010-0029121). Publisher Copyright: {\textcopyright} 2015 IEEE.; 5th International Conference on IT Convergence and Security, ICITCS 2015 ; Conference date: 24-08-2015 Through 27-08-2015",
year = "2015",
month = oct,
day = "5",
doi = "10.1109/ICITCS.2015.7292946",
language = "English",
series = "2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings",
}