Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange

被引:0
|
作者
Yoneyama, Kazuki [1 ]
机构
[1] NTT Informat Sharing Platform Labs, Tokyo, Japan
来源
关键词
authenticated key exchange; attribute-based authenticated key exchange; eCK model; large universe of attributes; ENCRYPTION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a two-party attribute-based authenticated key exchange scheme secure in the stronger security model than the previous models. Our strong security model is a natural extension of the eCK model, which is for PKI-based authenticated key exchange, into the attribute-based setting. We prove the security of our scheme under the gap Bilinear Diffie-Hellman assumption. Moreover, while the previous scheme needs the three-pass interaction between parties, our scheme needs only the two-pass interaction. In a practical sense, we can use any string as an attribute in our scheme because the setup algorithm of our scheme does not depend on the number of attribute candidates (i.e., the setup algorithm outputs constant size parameters).
引用
收藏
页码:147 / 166
页数:20
相关论文
共 50 条
  • [1] Attribute-Based Authenticated Key Exchange
    Gorantla, M. Choudary
    Boyd, Colin
    Nieto, Juan Manuel Gonzalez
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 300 - 317
  • [2] Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model
    Xiao, Yuting
    Zhang, Rui
    Ma, Hui
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 171 - 198
  • [3] An Efficient Attribute-Based Authenticated Key Exchange Protocol
    Chakraborty, Suvradip
    Rao, Y. Sreenivasa
    Rangan, Chandrasekaran Pandu
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 493 - 503
  • [4] Attribute-based authenticated key agreement protocol secure in ABeCK model
    Gao, Hai-Ying
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12): : 3183 - 3195
  • [5] Authenticated Key Exchange Protocols Based on Provable Secure Attribute
    Xia, Hui
    Liu, Jie
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1421 - 1425
  • [6] Efficient single round attribute-based authenticated key exchange protocol
    Chakraborty, Suvradip
    Rao, Sreenivasa Y.
    Pandu Rangan, C.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 313 - 336
  • [7] IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol
    Huang, Hai
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1153 - 1161
  • [8] Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem
    Zeng, Runzhi
    Wang, Libin
    IET INFORMATION SECURITY, 2020, 14 (06) : 764 - 772
  • [9] DABKE: Secure deniable attribute-based key exchange framework
    Tian, Yangguang
    Li, Yingjiu
    Yang, Guomin
    Susilo, Willy
    Mu, Yi
    Cui, Hui
    Zhang, Yinghui
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (02) : 259 - 275
  • [10] Attribute-based Authenticated Protocol for Secure Communication of VANET
    Han Yiliang
    Lin Xi
    Jiang Di
    Fang Dingyi
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 4078 - 4081