Attribute Verifier for Internet of Things

被引:7
作者
Alshawki, Mohammed B. [1 ,2 ,3 ]
Yan, Yuping [1 ]
Ligeti, Peter [1 ]
Reich, Christoph [2 ]
机构
[1] Eotvos Lorand Univ, Dept Comp Algebra, Budapest, Hungary
[2] Furtwangen Univ, Dept Comp Sci, Furtwangen, Germany
[3] Univ Kufa, Dept Comp Sci, Najaf, Iraq
来源
2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC) | 2022年
关键词
attribute-based encryption; attribute verification; zero-knowledge proof;
D O I
10.1109/ITNAC55475.2022.9998348
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Identity management, authentication, and attribute verification are among the main concerns in many Internet of Things (IoT) applications. Considering the privacy concerns, attribute verification became more important in many applications. Many of the proposed models in this field suffer from privacy and scalability issues as they depend on a centralized entity. In this paper, we proposed a decentralized attribute verifier based on a challenge-response approach. To address various IoT attribute verification requirements, the proposed model provides two modes of attribute verification, namely 1-out-of-n verification and n-out-of-n verification modes, in which the participants can prove the possession of one or all of the given target attributes.
引用
收藏
页码:320 / 322
页数:3
相关论文
共 14 条
[1]  
AKAGI N, 2008, INT C FINANCIAL CRYP, P272
[2]   Attred: Attribute Based Resource Discovery for IoT [J].
Alshawki, Mohammed B. ;
Yan, Yuping ;
Ligeti, Peter ;
Reich, Christoph .
SENSORS, 2021, 21 (14)
[3]  
Bat-Erdene Baasansuren, 2022, 2022 7th International Conference on Signal and Image Processing (ICSIP), P377, DOI 10.1109/ICSIP55141.2022.9887218
[4]  
Blömer J, 2018, LECT NOTES COMPUT SC, V10892, P221, DOI 10.1007/978-3-319-93387-0_12
[5]   Random oracle-based anonymous credential system for efficient attributes proof on smart devices [J].
Guo, Nan ;
Gao, Tianhan ;
Park, Hwagyoo .
SOFT COMPUTING, 2016, 20 (05) :1781-1791
[6]  
Kamel M. B., 2020, 2020 4 CYBER SECURIT, P1
[7]  
Kamel M. B., 2022, P 7 INT C INFORM COM
[8]  
Kamel MB, 2022, APPL CRYPTOGRAPHY NE, P611
[9]  
Kamel MB, 2022, 2022 INT C ELECT COM, ppp1
[10]   Securely outsourcing the ciphertext-policy attribute-based encryption [J].
Kim Thuat Nguyen ;
Oualha, Nouha ;
Laurent, Maryline .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01) :169-183