The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Attribute-Based Identification: Definitions and Efficient Constructions

Hiroaki ANADA, Seiko ARITA, Sari HANDA, Yosuke IWABUCHI

  • Full Text Views

    0

  • Cite this

Summary :

We propose a notion of attribute-based identification (ABID) in two flavors: prover-policy ABID (PP-ABID) and verifier-policy ABID (VP-ABID). In a PP-ABID scheme, a prover has an authorized access policy written as a boolean formula over attributes, while each verifier maintains a set of attributes. The prover is accepted when his access policy fits the verifier's set of attributes. In a VP-ABID scheme, a verifier maintains an access policy written as a boolean formula over attributes, while each prover has a set of authorized attributes. The prover is accepted when his set of attributes satisfies the verifier's access policy. Our design principle is first to construct key-policy and ciphertext-policy attribute-based key encapsulation mechanisms (KP-ABKEM and CP-ABKEM). Second, we convert KP-ABKEM and CP-ABKEM into challenge-and-response PP-ABID and VP-ABID, respectively, by encapsulation-and-decapsulation. There, we show that KP-ABKEM and CP-ABKEM only have to be secure against chosen-ciphertext attacks on one-wayness (OW-CCA secure) for the obtained PP-ABID and VP-ABID to be secure against concurrent man-in-the-middle attacks (cMiM secure). According to the design principle, we construct concrete KP-ABKEM and CP-ABKEM with the OW-CCA security by enhancing the KP-ABKEM of Ostrovsky, Sahai and Waters and CP-ABKEM of Waters, respectively. Finally, we obtain concrete PP-ABID and VP-ABID schemes that are proved to be selectively secure in the standard model against cMiM attacks.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E97-A No.5 pp.1086-1102
Publication Date
2014/05/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E97.A.1086
Type of Manuscript
PAPER
Category
Cryptography and Information Security

Authors

Hiroaki ANADA
  Institute of Information Security,Information Technologies and Nanotechnologies (ISIT)
Seiko ARITA
  Institute of Information Security
Sari HANDA
  Institute of Information Security
Yosuke IWABUCHI
  Institute of Information Security

Keyword