
ATTRIBUTE-BASED AUTHENTICATION SCHEMES: A SURVEY
Author(s) -
Huihui Yang,
Vladimir Oleshchuk
Publication year - 2015
Publication title -
computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.184
H-Index - 11
eISSN - 2312-5381
pISSN - 1727-6209
DOI - 10.47839/ijc.14.2.805
Subject(s) - computer science , traceability , revocation , authentication (law) , identity (music) , cryptography , computer security , hierarchy , tree (set theory) , mathematics , overhead (engineering) , software engineering , mathematical analysis , physics , acoustics , economics , market economy , operating system
Attribute-based authentication (ABA) is a way to authenticate users via attributes which are the properties of those to be authenticated, for example, resources, contextual information (time, location, etc.) or their combination. In ABA schemes, attributes instead of identity are requested to be presented or even evidence showing that users own the required attributes is enough, so it is more flexible and privacy-preserving compared with traditional identity-based authentication. In this paper, we first explain the general structure and security requirements of ABA schemes, and then give an example to demonstrate their cryptographic construction. Next, we analyze recent work and discuss future research topics on the construction of ABA schemes, including attribute tree building, cryptographic construction, security models, hierarchy, traceability and revocation.