Abstract
Authentication and authorization are crucial for ensuring the security of information systems. Role-based access control (RBAC) can act as an efficient method of managing authorization of system resources. In this paper, we apply identity-based signature (IBS) technique to cryptographically provide user authentication and role-based authorization. To achieve this, we first extend the RBAC model to incorporate identity-based cryptography. Our access control architecture is derived from an identity-based signature scheme on bilinear pairings and eliminates the use of digital certificates. In our suggestion, the manager checks the validity of a user’s identity and user’s activated roles simultaneously by verifying a corresponding signature, thus the user authentication and role-based authorization procedures can be combined into one operation. We also prove the security of the proposed scheme in the random oracle model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE computer 29(2), 38–47 (1996)
Ferraiolo, D.F., Sandhu, F., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Trans. Information and System Security 4(3), 224–274 (2001)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 47–53. Springer, Heidelberg (1996)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 111–121. Springer, Heidelberg (2003)
Nali, D., Adams, C., Miri, A.: Using mediated identity-based cryptography to support role- based access control. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 245–256. Springer, Heidelberg (2004)
Cha, J., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 18–30. Springer, Heidelberg (1996)
Hess, F.: Efficient identity based signature schemes based on pairings. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 310–324. Springer, Heidelberg (1996)
Paterson, K.G.: ID-based signatures from pairings on elliptic curves. Cryptology ePrint Archive, Report 2002/004 (2002), http://eprint.iacr.org/2002/004.
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symposium on Cryptography and Information Security-SCIS 2000 (2000)
Public-Key Infrastructure.(X.509: http://www.ietf.org/html.charters/pkixcharter.html
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 514–532. Springer, Heidelberg (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, J., Yu, J., Li, D., Bai, X., Jia, Z. (2007). Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_89
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_89
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)