A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing

Abstract People-Centric Sensing (PCS) is a new sensing paradigm, in which people’s context information is described by attributes. However, due to the nature of “people centric” and dynamicity, the prevalence of PCS faces two main challenges, including authentication with privacy preservation and complex identity revocation. In this paper, we propose the ABS-KR, an attribute-based signature scheme supporting key revocation. ABS-KR inherits the advantage of most attribute-based signature schemes, that is, a signature only shows that whether the user owns attributes satisfying the verification policy, no more information about his identifier or attributes, implementing authentication with privacy preservation. Furthermore, we introduce a mediator responsible for the key revocation to reduce the workload of the attribute authority managing users’ attributes and generating secret key for them. The core idea of performing flexible revocation is to divide a user’s secret key into two shares, and give one part to the mediator, making the user asking the mediator for help to generate a valid signature. Before answering the user, the mediator performs a revocation check for the user’s identifier and claimed attributes. If and only if the signer owns unrevoked attributes satisfying the policy, he can generate a valid signature. In addition, the mediator realizes instantaneous key revocation through revocation check during signing a message. Moreover, our ABS-KR supports monotone policies in the form of attribute trees under the computational Diffie–Hellman assumption.

[1]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[2]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[3]  Marek R. Ogiela,et al.  Advances in Cognitive Information Systems , 2012, Cognitive Systems Monographs.

[4]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[5]  Im-Yeong Lee,et al.  Authentication protocol using an identifier in an ad hoc network environment , 2012, Math. Comput. Model..

[6]  Brent Waters,et al.  Secure attribute-based systems , 2006, CCS '06.

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  C. Pandu Rangan,et al.  Attribute Based Signatures for Bounded Multi-level Threshold Circuits , 2010, EuroPKI.

[9]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[10]  Marek R. Ogiela,et al.  DNA-like linguistic secret sharing for strategic information systems , 2012, Int. J. Inf. Manag..

[11]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[12]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[13]  Vipul Goyal,et al.  Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..

[14]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[15]  Manoj Prabhakaran,et al.  Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..

[16]  Bok-Min Goi,et al.  On the Security of an Attribute-Based Signature Scheme , 2009 .

[17]  Guo Shaniqng,et al.  Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[18]  Paz Morillo,et al.  Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model , 2011, AFRICACRYPT.

[19]  Pieter H. Hartel,et al.  Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.

[20]  Jin Li,et al.  Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..

[21]  Tatsuaki Okamoto,et al.  Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.

[22]  Hideki Imai,et al.  Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.

[23]  Marek R. Ogiela,et al.  Linguistic protocols for secure information management and sharing , 2012, Comput. Math. Appl..