Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature

  • Authors:
  • Jin Wang;Jia Yu;Daxing Li;Xi Bai;Zhongtian Jia

  • Affiliations:
  • Institute of Network and Information Security, Shandong University, Jinan 250100, China;Institute of Network and Information Security, Shandong University, Jinan 250100, China and College of Information Engineering, Qingdao University, Qingdao 266071, China;Institute of Network and Information Security, Shandong University, Jinan 250100, China;Institute of Network and Information Security, Shandong University, Jinan 250100, China;Institute of Network and Information Security, Shandong University, Jinan 250100, China and School of Information Science and Engineering, Jinan University, Jinan 250022, China

  • Venue:
  • Computational Intelligence and Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authentication and authorization are crucial for ensuring the security of information systems. Role-based access control (RBAC) can act as an efficient method of managing authorization of system resources. In this paper, we apply identity-based signature (IBS) technique to cryptographically provide user authentication and role-based authorization. To achieve this, we first extend the RBAC model to incorporate identity-based cryptography. Our access control architecture is derived from an identity-based signature scheme on bilinear pairings and eliminates the use of digital certificates. In our suggestion, the manager checks the validity of a user's identity and user's activated roles simultaneously by verifying a corresponding signature, thus the user authentication and role-based authorization procedures can be combined into one operation. We also prove the security of the proposed scheme in the random oracle model.