TY - GEN
T1 - Certificate-free Attribute Authentication
AU - Khader, Dalia
AU - Chen, L Q
AU - Davenport, James H
PY - 2009
Y1 - 2009
N2 - In this paper we propose the concept of Certificate-free Attribute Authentication (C-AA), which holds a few interesting features, such as a user can demonstrate (1) he owns sufficient attributes to pass an attribute verification without showing his full attribute details, (2) he has been authorized by a number of authorities without revealing his identity, and (3) no certification of the user's public key is required, and his secret key as a whole is not escrowed by any authority. Although these features have individually been used in various of cryptographic primitives, in this paper we combine them together and demonstrate a Certificate-free Attribute Authentication Scheme (C-AAS) is useful in practice. We provide a formal definition of a C-AAS and four security notions: full anonymity, full traceability, non-frameability and attribute unforgeability. We also construct a concrete C-AAS and prove it is correct and secure under the definition and security notions.
AB - In this paper we propose the concept of Certificate-free Attribute Authentication (C-AA), which holds a few interesting features, such as a user can demonstrate (1) he owns sufficient attributes to pass an attribute verification without showing his full attribute details, (2) he has been authorized by a number of authorities without revealing his identity, and (3) no certification of the user's public key is required, and his secret key as a whole is not escrowed by any authority. Although these features have individually been used in various of cryptographic primitives, in this paper we combine them together and demonstrate a Certificate-free Attribute Authentication Scheme (C-AAS) is useful in practice. We provide a formal definition of a C-AAS and four security notions: full anonymity, full traceability, non-frameability and attribute unforgeability. We also construct a concrete C-AAS and prove it is correct and secure under the definition and security notions.
UR - http://www.scopus.com/inward/record.url?scp=72449125589&partnerID=8YFLogxK
UR - http://dx.doi.org/10.1007/978-3-642-10868-6_18
U2 - 10.1007/978-3-642-10868-6_18
DO - 10.1007/978-3-642-10868-6_18
M3 - Chapter in a published conference proceeding
SN - 9783642108679
T3 - Lecture Notes in Computer Science
SP - 301
EP - 325
BT - Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009. Proceedings
A2 - Parker, M G
PB - Springer
CY - Berlin
T2 - 12th IMA Conference on Cryptography and Coding
Y2 - 15 December 2009 through 17 December 2009
ER -