{"title":"An attribute-based mutual authentication scheme with time-bounded keys","authors":"Han-Yu Lin, Pei-yih Ting, Hong-Ru Wu","doi":"10.1145/3369555.3369568","DOIUrl":null,"url":null,"abstract":"Remote user authentication scheme is an important technique for securely accessing the resources of servers. Traditionally, password-based authentication schemes are commonly adopted mechanisms, i.e., a user first chooses a password and then registers to the server for becoming a legitimate member. Nevertheless, such schemes are vulnerable to password guessing attacks and a remote server might have to maintain a password table for verifying users. In recent years, attribute-based cryptosystems have been received much attention. An attribute-based authentication scheme allows a remote system to verify a user's membership according to his/her owned attribute sets without using passwords. In 2015, Yun et al. proposed an improved attribute-based authentication protocol by utilizing Shamir's secret sharing technique. Their protocol is secure against man-in-the-middle, replay and collusion attacks. However, we find out that their scheme only achieves one-way authentication rather than mutual authentication. In this paper, we extend their work to further fulfill the crucial property of mutual authentication. Moreover, we incorporate the concept of time-bounded keys into the extended variant for providing more flexible applications in the real world.","PeriodicalId":377760,"journal":{"name":"Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3369555.3369568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Remote user authentication scheme is an important technique for securely accessing the resources of servers. Traditionally, password-based authentication schemes are commonly adopted mechanisms, i.e., a user first chooses a password and then registers to the server for becoming a legitimate member. Nevertheless, such schemes are vulnerable to password guessing attacks and a remote server might have to maintain a password table for verifying users. In recent years, attribute-based cryptosystems have been received much attention. An attribute-based authentication scheme allows a remote system to verify a user's membership according to his/her owned attribute sets without using passwords. In 2015, Yun et al. proposed an improved attribute-based authentication protocol by utilizing Shamir's secret sharing technique. Their protocol is secure against man-in-the-middle, replay and collusion attacks. However, we find out that their scheme only achieves one-way authentication rather than mutual authentication. In this paper, we extend their work to further fulfill the crucial property of mutual authentication. Moreover, we incorporate the concept of time-bounded keys into the extended variant for providing more flexible applications in the real world.