Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting

被引:0
|
作者
Li, Peng [1 ]
Lai, Junzuo [1 ]
Wu, Yongdong [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
SIGNATURE; CREDENTIALS; SCHEME;
D O I
10.1155/2021/6611518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous anonymous authentication schemes are designed to provide efficient authentication services while preserving privacy. Such schemes may easily neglect access control and accountability, which are two requirements that play an important role in some particular environments and applications. Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability. To address this problem, we formally define and present a new primitive called traceable attribute-based anonymous authentication (TABAA) which achieves (i) full anonymity, i.e., both registration and authentication cannot reveal user's privacy; (ii) reusable credential, i.e., a registered credential can be repeatedly used without being linked; (iii) access control, i.e., only when the user's attribute satisfies the access policy can the user be involved in authentication; and (iv) public traceability, i.e., anyone, without help from the trusted third party, can trace a misbehaving user who has authenticated two messages corresponding to a common address. Then, we formally define the security requirements of TABAA, including unforgeability, anonymity, and accountability, and give a generic construction satisfying the security requirements. Furthermore, based on TABAA, we propose the first attribute-based, decentralized, fully anonymous, publicly traceable e-voting, which enables voters to engage in a number of different voting activities without repeated registration.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] New attribute-based authentication and its application in anonymous cloud access service
    Li, Jin
    Chen, Xiaofeng
    Huang, Xinyi
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2015, 11 (01) : 125 - 141
  • [2] Traceable Hierarchical Attribute-based Authentication for the Cloud
    Yang, Huihui
    Oleshchuk, Vladimir A.
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 685 - 689
  • [3] Event-oriented linkable and traceable anonymous authentication and its application to voting
    Li, Peng
    Lai, Junzuo
    Wu, Yongdong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [4] A study on the traceable attribute-based signature scheme provided with anonymous credentials
    Hwang, Yong Woon
    Kim, Taehoon
    Seo, Daehee
    Lee, Im-Yeong
    CONNECTION SCIENCE, 2024, 36 (01)
  • [5] Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare
    Meng, Dacheng
    Wang, Wenbo
    Luo, Entao
    Wang, Guojun
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 178 - 189
  • [6] Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare
    Luo, Entao
    Wang, Guojun
    Tang, Kun
    Zhao, Quanyou
    He, Chen
    Guo, Liyong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 495 - 505
  • [7] Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
    Zeng, Yongbin
    Guang, Hui
    Li, Guangsong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
    Yang, Huihui
    Oleshchuk, Vladimir A.
    SECURE IT SYSTEMS, NORDSEC 2015, 2015, 9417 : 123 - 135
  • [9] Traceable attribute-based signature
    Gu, Ke
    Wang, Keming
    Yang, Lulu
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [10] Traceable attribute-based signcryption
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2302 - 2317