k-Times Attribute-Based Anonymous Access Control for Cloud Computing

In this paper, we propose a new notion called $k$ -times attribute-based anonymous access control , which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a $k$ -times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum $k$ -times within a period or an event. Further additional access will be denied. We also prove the security of our instantiation. Our implementation result shows that our scheme is practical.

[1]  Mihir Bellare,et al.  On Defining Proofs of Knowledge , 1992, CRYPTO.

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  Ivan Damgård,et al.  Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions , 2000, Public Key Cryptography.

[4]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[5]  Joseph K. Liu,et al.  Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.

[6]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[7]  Kazue Sako,et al.  k-Times Anonymous Authentication (Extended Abstract) , 2004, ASIACRYPT.

[8]  Joseph K. Liu,et al.  Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.

[9]  Reihaneh Safavi-Naini,et al.  Dynamic k-Times Anonymous Authentication , 2005, ACNS.

[10]  Yevgeniy Dodis,et al.  A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.

[11]  Yi Mu,et al.  Constant-Size Dynamic k-TAA , 2006, SCN.

[12]  Joseph K. Liu,et al.  Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature , 2006, Int. J. Found. Comput. Sci..

[13]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[14]  Lan Nguyen Efficient Dynamic k-Times Anonymous Authentication , 2006, VIETCRYPT.

[15]  Kazue Sako,et al.  k-Times Anonymous Authentication with a Constant Proving Cost , 2006, Public Key Cryptography.

[16]  Tsz Hon Yuen,et al.  Ring signatures without random oracles , 2006, ASIACCS '06.

[17]  Jan Camenisch,et al.  How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.

[18]  Brent Waters,et al.  Full-Domain Subgroup Hiding and Constant-Size Group Signatures , 2007, Public Key Cryptography.

[19]  Kari Barlow,et al.  Like technology from an advanced alien culture: Google apps for education at ASU , 2007, SIGUCCS '07.

[20]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[21]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[22]  Yi Mu,et al.  Revocable Ring Signature , 2007, Journal of Computer Science and Technology.

[23]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[24]  Liqun Chen,et al.  Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices , 2010, ISC.

[25]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[26]  Joseph K. Liu,et al.  A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) , 2010, ProvSec.

[27]  Tsz Hon Yuen,et al.  Threshold ring signature without random oracles , 2011, ASIACCS '11.

[28]  Tsz Hon Yuen,et al.  Forward Secure Ring Signature without Random Oracles , 2011, ICICS.

[29]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[30]  Robert H. Deng,et al.  HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.

[31]  Tsz Hon Yuen,et al.  Forward Secure Attribute-Based Signatures , 2012, ICICS.

[32]  Joseph K. Liu,et al.  Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE , 2013, IEEE Transactions on Information Forensics and Security.

[33]  Tsz Hon Yuen,et al.  Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction , 2013, Theor. Comput. Sci..

[34]  P. MuraliKrishna,et al.  SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .

[35]  Tsz Hon Yuen,et al.  Efficient Linkable and/or Threshold Ring Signature Without Random Oracles , 2013, Comput. J..

[36]  Joseph K. Liu,et al.  New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era , 2014, ESORICS.

[37]  Tatsuaki Okamoto,et al.  Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.

[38]  Joseph K. Liu,et al.  Linkable Ring Signature with Unconditional Anonymity , 2014, IEEE Transactions on Knowledge and Data Engineering.