AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication

被引:1
|
作者
Song, Mi [1 ,2 ,3 ]
Wang, Ding [1 ,2 ,3 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[2] Minist Educ, Key Lab Data & Intelligent Syst Secur, Tianjin 300350, Peoples R China
[3] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Passwords; Security; Protocols; Servers; Privacy; Smart cards; Two-factor authentication; key exchange; flexible access control; attribute authentication; eCK model; PHYSICAL LAYER AUTHENTICATION; SECURE; EFFICIENT; SCHEME;
D O I
10.1109/TIFS.2024.3402073
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Two-factor authentication provides a strong defense against account compromise. However, traditional two-factor authentication schemes cannot provide users with much flexibility and fine-grained authorization. In this work, we present an efficient design of Attribute-Based Password Authenticated Key Exchange (AB-PAKE) protocol, ensuring that only two legitimate users with desired attributes and correct passwords can establish a shared session key. We, for the first time, tackle the problem of "how to enhance a peer-to-peer PAKE scheme by using a storage device (e.g., a smart-phone, a USB token, or a personal computer that the user logs in), such that even if ephemeral secret keys of two participants have been leaked, it still provides user privacy protection and truly two-factor security". AB-PAKE works well in peer-to-peer (i.e., end-to-end) scenarios where the participants expect to hide their real identity information and the peer is enforced to satisfy the defined conditions (aka authentication policy). It achieves flexibility, privacy preservation, and dynamic access control lacking in prior authentication proposals. In addition, our work mitigates a practical threat in authenticated key exchange schemes, namely, the ephemeral secret leakage attack. We aim to increase the attack difficulty and limit password leakage even if the user's long-term key or ephemeral key is leaked. The proposed protocol is also round-optimal, i.e., it is a single-round protocol consisting of only two message flows among the parties. Our new construction of AB-PAKE protocol reduces the number of pairing operations to be constant and supports richer policies. Provable security and practicality are demonstrated by comprehensive analysis.
引用
收藏
页码:6197 / 6212
页数:16
相关论文
共 50 条
  • [1] Achieving fine-grained access control in virtual organizations
    Zhang, N.
    Yao, L.
    Nenadic, A.
    Chin, J.
    Goble, C.
    Rector, A.
    Chadwick, D.
    Otenko, S.
    Shi, Q.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2007, 19 (09): : 1333 - 1352
  • [2] Linkable and traceable anonymous authentication with fine-grained access control
    Li, Peng
    Lai, Junzuo
    Zhou, Dehua
    Huang, Lianguan
    Sun, Meng
    Wu, Wei
    Yang, Ye
    FRONTIERS OF COMPUTER SCIENCE, 2025, 19 (02)
  • [3] Achieving fine-grained access control and integrity auditing in cloud storage
    Yuan, S. (ysm1005@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [4] Achieving Fine-Grained and Flexible Access Control on Blockchain-Based Data Sharing for the Internet of Things
    Ruimiao Wang
    Xiaodong Wang
    Wenti Yang
    Shuai Yuan
    Zhitao Guan
    ChinaCommunications, 2022, 19 (06) : 22 - 34
  • [5] Achieving fine-grained and flexible access control on blockchain-based data sharing for the Internet of Things
    Wang, Ruimiao
    Wang, Xiaodong
    Yang, Wenti
    Yuan, Shuai
    Guan, Zhitao
    CHINA COMMUNICATIONS, 2022, 19 (06) : 22 - 34
  • [6] Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
    Yu, Shucheng
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [7] Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data
    Yang, Yanjiang
    Ding, Xuhua
    Lu, Haibing
    Wan, Zhiguo
    Zhou, Jianying
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 293 - 308
  • [8] Fine-Grained Access Control for Microservices
    Nehme, Antonio
    Jesus, Vitor
    Mahbub, Khaled
    Abdallah, Ali
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 285 - 300
  • [9] Achieving fine-grained access control for secure data sharing on cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1443 - 1464
  • [10] Toward Achieving Fine-Grained Access Control of Data in Connected and Autonomous Vehicles
    Cui, Jie
    Chen, Xuelian
    Zhang, Jing
    Zhang, Qingyang
    Zhong, Hong
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10) : 7925 - 7937