Efficient and flexible multi-authority attribute-based authentication for IoT devices
Su, Ye ORCID: https://orcid.org/0000-0002-4912-3197, Zhang, Xi, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396 and Ma, Jixin ORCID: https://orcid.org/0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3263497)
Preview |
PDF (Publisher VoR)
41485_MA_Efficient_and_flexible_multi_authority_attribute_based_authentication_for_IoT_devices.pdf - Accepted Version Download (2MB) | Preview |
Abstract
The correctness and reliability of data sources are the keys to the practicality of data collected by IoT devices. Attribute-based signature(ABS) is a cryptographic primitive for users to sign with their own attributes, which can be applied to the authentication process in IoT scenarios. The attribute authority is responsible for issuing the attribute key to the user in ABS. Multiple authorities can complete attribute management tasks to avoid the threat of a single authority. However, attribute authorities need to execute multiple interactions to collaborate to generate attribute keys for users, which brings a large transmission burden. In addition, a lot of resource-constrained terminals in the IoT mostly play the role of signer or verifier in authentication protocols. The signature generation and verification algorithms often have heavy pairing and exponentiation operations. Currently, no ABS scheme takes into account the efficiency of all participating entities simultaneously. In this paper, we present an aggregated anonymous key issue (AAKI) protocol to reduce the transmission burden between multiple authorities. Meanwhile, the non-interactive zero-knowledge proof aggregate exponentiation (NI-ZKPoKAE) protocol is designed to aggregate the transmitted secret values in AAKI. To reduce the computational burden of signers and verifiers, Blakley secret sharing, where the Hadamard matrix is used more efficiently to handle the (n,n)-threshold, is used to construct an efficient and fine-grained multi-authority ABS (EFMA-ABS) scheme. This brings high efficiency to all three types of parties involved in IoT authentication. Our above-mentioned protocols have been proven to be feasible and effective.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | attribute-based signature; multi-authority; IoT authentication; proof of knowledge; aggregated anonymous key issue; Blakley secret sharing |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Faculty / School / Research Centre / Research Group: | Faculty of Engineering & Science Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS) |
Related URLs: | |
Last Modified: | 30 Jun 2023 10:10 |
URI: | http://gala.gre.ac.uk/id/eprint/41485 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year