A fuzzy attribute-based authentication scheme on the basis of lagrange polynomial interpolation

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Attribute-based encryption algorithm has been widely used to design mechanisms for access control and signature. The algorithm can also be introduced to the study of the authentication scheme and provides users with more flexibility and richer in descriptions. Based on Shamir’s Lagrange Polynomial Interpolation, we proposed a fuzzy attribute-based authentication scheme that enables the users to be authenticated only if their attributes satisfy the authorized attributes, aiming to design a flexible and safe attribute authentication scheme that uses fewer system resources for multi-networks’ users wireless roaming. Analyses have indicated that this scheme can resist the man-in-themiddle attacks, replay attacks and collusion attacks.

Cite

CITATION STYLE

APA

Zhu, S., Zhan, L., Qiang, H., Fu, D., Sun, W., & Tang, Y. (2015). A fuzzy attribute-based authentication scheme on the basis of lagrange polynomial interpolation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8944, pp. 685–692). Springer Verlag. https://doi.org/10.1007/978-3-319-15554-8_57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free