Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting

被引:0
|
作者
Li, Peng [1 ]
Lai, Junzuo [1 ]
Wu, Yongdong [1 ]
机构
[1] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
SIGNATURE; CREDENTIALS; SCHEME;
D O I
10.1155/2021/6611518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous anonymous authentication schemes are designed to provide efficient authentication services while preserving privacy. Such schemes may easily neglect access control and accountability, which are two requirements that play an important role in some particular environments and applications. Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability. To address this problem, we formally define and present a new primitive called traceable attribute-based anonymous authentication (TABAA) which achieves (i) full anonymity, i.e., both registration and authentication cannot reveal user's privacy; (ii) reusable credential, i.e., a registered credential can be repeatedly used without being linked; (iii) access control, i.e., only when the user's attribute satisfies the access policy can the user be involved in authentication; and (iv) public traceability, i.e., anyone, without help from the trusted third party, can trace a misbehaving user who has authenticated two messages corresponding to a common address. Then, we formally define the security requirements of TABAA, including unforgeability, anonymity, and accountability, and give a generic construction satisfying the security requirements. Furthermore, based on TABAA, we propose the first attribute-based, decentralized, fully anonymous, publicly traceable e-voting, which enables voters to engage in a number of different voting activities without repeated registration.
引用
收藏
页数:17
相关论文
共 50 条
  • [11] Server-aided anonymous attribute-based authentication in cloud computing
    Liu, Zhusong
    Yan, Hongyang
    Li, Zhike
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 61 - 66
  • [12] Efficient Traceable Attribute-Based Signature
    Ding, Shenglong
    Zhao, Yiming
    Liu, Yuyang
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 582 - 589
  • [13] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [14] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 487 - 492
  • [15] Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 198 - +
  • [16] Anonymous attribute certificates based on traceable signatures
    Benjumea, Vicente
    Lopez, Javier
    Troya, Jose M.
    INTERNET RESEARCH, 2006, 16 (02) : 120 - 139
  • [17] A Traceable and Anonymous Authentication Scheme Based on ECC
    YIN Fengmei
    HOU Zhengfeng
    WU Hao
    WuhanUniversityJournalofNaturalSciences, 2020, 25 (06) : 521 - 526
  • [18] Online/Offline Traceable Attribute-Based Encryption
    Zhang K.
    Ma J.
    Zhang J.
    Ying Z.
    Zhang T.
    Liu X.
    Ma, Jianfeng (jfma@mail.xidian.edu.cn), 2018, Science Press (55): : 216 - 224
  • [19] New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing
    Hafizpour, Hadis
    Shiri, Mohammad Ebrahim
    Rahmani, Amir Masoud
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [20] An Improved Fuzzy Attribute-Based Authentication
    Yun, Jong Pil
    Kim, Hyoseung
    Lee, Dong Hoon
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,