Skip to main content

Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

Abstract

Authentication and authorization are crucial for ensuring the security of information systems. Role-based access control (RBAC) can act as an efficient method of managing authorization of system resources. In this paper, we apply identity-based signature (IBS) technique to cryptographically provide user authentication and role-based authorization. To achieve this, we first extend the RBAC model to incorporate identity-based cryptography. Our access control architecture is derived from an identity-based signature scheme on bilinear pairings and eliminates the use of digital certificates. In our suggestion, the manager checks the validity of a user’s identity and user’s activated roles simultaneously by verifying a corresponding signature, thus the user authentication and role-based authorization procedures can be combined into one operation. We also prove the security of the proposed scheme in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE computer 29(2), 38–47 (1996)

    Google Scholar 

  2. Ferraiolo, D.F., Sandhu, F., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Trans. Information and System Security 4(3), 224–274 (2001)

    Article  Google Scholar 

  3. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 47–53. Springer, Heidelberg (1996)

    Google Scholar 

  4. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 111–121. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Nali, D., Adams, C., Miri, A.: Using mediated identity-based cryptography to support role- based access control. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 245–256. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Cha, J., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 18–30. Springer, Heidelberg (1996)

    Google Scholar 

  8. Hess, F.: Efficient identity based signature schemes based on pairings. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 310–324. Springer, Heidelberg (1996)

    Google Scholar 

  9. Paterson, K.G.: ID-based signatures from pairings on elliptic curves. Cryptology ePrint Archive, Report 2002/004 (2002), http://eprint.iacr.org/2002/004.

  10. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symposium on Cryptography and Information Security-SCIS 2000 (2000)

    Google Scholar 

  11. Public-Key Infrastructure.(X.509: http://www.ietf.org/html.charters/pkixcharter.html

  12. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Cointe, P. (ed.) ECOOP 1996. LNCS, vol. 1098, pp. 514–532. Springer, Heidelberg (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, J., Yu, J., Li, D., Bai, X., Jia, Z. (2007). Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_89

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_89

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics