期刊文献+

基于属性的认证密钥协商协议 被引量:2

Attribute-based authenticated key agreement protocol
下载PDF
导出
摘要 提出了一个通用的基于属生的抗选择密文安全的密钥封装方案,并根据密钥抽取函数的不同功能,将标准模型下密钥抽取细化为随机提取和密钥抽取两个步骤.再以此为基础,设计了一个新的基于属性的认证密钥协商协议,定义了基于属性的可证安全密钥协商模型,并在标准模型下证明了该协议的安全性. A generic attribute-based key encapsulation mechanism, which was to prevent chosen-ciphertext attack, was designed for the first time. The key derivation phase in the standard model was subdivided into randomness extraction and key derivation. On this basis, a new attribute-based authenticated key agreement protocol was constructed, which defined to be a provable secure model and its security was proven in the standard model.
出处 《兰州大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第2期103-110,共8页 Journal of Lanzhou University(Natural Sciences)
基金 国家高技术研究发展计划(863计划)项目(2006AA706103) 国防军工基础科研项目(C0720061360)
关键词 基于属性的密码学 认证密钥协商协议 可证安全 attribute-based cryptography authenticated key agreement protocol provably security
  • 相关文献

参考文献1

二级参考文献5

共引文献5

同被引文献14

  • 1Sahai A, Waters B. Fuzzy Identity Based Encryption[C]//Proc. of Cryptology-Eurocrypt'05. [S. 1.]: Springer-Verlag, 2005: 457-473.
  • 2Boneh D, Franklin M. Identity Based Encryption from the Well Pairing[C]//Proc. of Cryptology-Crypto'01. IS. 1.]: Springer-Verlag, 2001: 231-229.
  • 3Chen Liqun, Cheng Zhaohui, Smart N P. Identity-based Key Agreement Protocols from Pairings, Cryptology ePrint Archive[EB/OL]. (2006-10-21). http://eprint.iacr.org/2006/ 199.
  • 4王永涛,何明星,郭振洲,等.一个基于身份的密钥协商协议[C]//2006年中国西部青年通信学术会议论文集.成都:四川省电子学会出版社,2006:584-588.
  • 5Ateniese G, Kirsch J, Blanton M. Secret Handshakes with Dynamic and Fuzzy Matching[C]//Proc. of Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2007: 159-177.
  • 6Wang Hao, Xu Qiuliang, Fu Xiu. Two-party Attribute-based Key Agreement Protocol in the Standard Model[C]//Proc. of 2009 International Symposium on Information Processing. Jinan, China: [s. n.], 2009: 325-328.
  • 7Steinwandt R, Corona A S. Attribute-based Group Key Establishment[EB/OL]. (2010-10-20). http://eprint.iacr.org/ 2010/235.
  • 8Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine Grained Access Control of Encrypted Data[C]//Proc. of ACM Conference on Computer and Communications Security. [S. 1.]: ACM Press, 2006: 89-98.
  • 9Beimel A. Secure Schemes Distribution[D]. Haifa, Israel 1996. for Secret Sharing and Key Israel Institute of Technology,.
  • 10Bellare M, Rogaway E Entity Authentication and Key Distribution[C]//Proc. ofCRYPTO'94. [S. 1.]: Springer-Verlag, 1994: 232-249.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部