An improved fuzzy attribute-based authentication

Jong Pil Yun, Hyoseung Kim, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    Authentication protocol is variously designed by attribute-based encryption. In some case, there is situation that need the authentication with revealed ID of users. Zhu et al present attribute authentication protocol containing ID. But their protocol did not have security under collusion attack and impersonation attack. In this paper, we propose enhanced protocol from Zhu et al.'s protocol. The protocol was constructed based on fuzzy attribute-based authentication protocol on the basis of Lagrange polynomial interpolation. Our protocol has some good features which are safer than existing protocol. We also showed that our protocol has sufficient security under assumption of specific attack situations. So, we expect this protocol will be widely used to various environment which needs the multi-factor identifications.

    Original languageEnglish
    Title of host publication2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Electronic)9781467365376
    DOIs
    Publication statusPublished - 2015 Oct 5
    Event5th International Conference on IT Convergence and Security, ICITCS 2015 - Kuala Lumpur, Malaysia
    Duration: 2015 Aug 242015 Aug 27

    Publication series

    Name2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings

    Other

    Other5th International Conference on IT Convergence and Security, ICITCS 2015
    Country/TerritoryMalaysia
    CityKuala Lumpur
    Period15/8/2415/8/27

    Bibliographical note

    Publisher Copyright:
    © 2015 IEEE.

    Keywords

    • Authentication
    • Cryptography
    • Interpolation
    • Polynomials
    • Protocols
    • Resistance

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Signal Processing

    Fingerprint

    Dive into the research topics of 'An improved fuzzy attribute-based authentication'. Together they form a unique fingerprint.

    Cite this