Journal on Communications ›› 2021, Vol. 42 ›› Issue (3): 220-228.doi: 10.11959/j.issn.1000-436x.2021047

• Correspondences • Previous Articles     Next Articles

Multi-authority attribute-based identification scheme

Fei TANG1,2, Jiali BAO1, Yonghong HUANG2, Dong HUANG3, Huili WANG4,5   

  1. 1 College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    2 School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    3 Information Engineering Institute, Chongqing Vocational and Technical University of Mechatronics, Chongqing 402760, China
    4 Information Security Research Center, China Electronic Technology Standardization Institute, Beijing 100076, China
    5 State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
  • Revised:2021-01-05 Online:2021-03-25 Published:2021-03-01
  • Supported by:
    The National Key Research and Development Program of China(2018YFB0803905);The National Natural Science Foundation of China(61702067);The Natural Science Foundation of Chongqing(cstc2017jcyjAX0201);The Natural Science Foundation of Chongqing(cstc2020jcyj-msxmX0343)

Abstract:

Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance.

Key words: identification, attribute-based cryptography, multi-authority, distributed key generation

CLC Number: 

No Suggested Reading articles found!