By Topic

Combining Authentication with Role-Based Access Control Based on IBS

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
4 Author(s)
Jin Wang ; Inst. or Inf. & Network Security, Shandong Univ., Jinan ; Jia Yu ; Daxing Li ; Zhongtian Jia

Authentication and access control are crucial for information and system security. In this paper, we present a scheme to cryptographically provide authentication and role-based access control (RBAC) for large organizations using identity-based signature (IBS) technique. To achieve this, we first extend the elements user and role in RBAC model to cooperate with identity-based cryptography. Our scheme is derived from Cha-Cheon's identity-based signature scheme based on bilinear pairings. In our scheme, both user authentication and role-based authorization can be verified simultaneously by a user's signature, so the independent authentication procedure is eliminated. We also prove the security of the proposed scheme against adaptively chosen message and ID attack under the random oracle model

Published in:

Computational Intelligence and Security, 2006 International Conference on  (Volume:2 )

Date of Conference:

3-6 Nov. 2006