期刊文献+

可证安全的基于属性密钥交换 被引量:1

Provable Secure Key Exchange Based on Attribute
下载PDF
导出
摘要 分析了密钥交换协议的特点,提出了一种基于属性的密钥交换协议,能够更灵活地控制不同用户参与密钥交换的权限,该协议基于Sahai-Waters ABE体制,只需要一轮消息通信。研究了密钥交换协议的安全需求,应用"敌手-挑战者"游戏,提出了基于属性密钥交换协议的语义安全性定义,进一步在标准模型中证明了协议的安全性。 With the extension of identity-based cryptography,the attribute-based encryption haas been used to control different authorities of decrypting a cipher-text among different users in a more flexible manner.Thus attribute-based encryption has become a hot research topic nowadays.With the development of attribute-based encryption,the attribute-based key exchange has also become a point which attracts a great deal of attention.The distinctive features of key exchange protocols are analyzed.An attribute-based key exchange based on Sahai-Waters attribute-based encryption is proposed,which can flexibly control the access authority of different users.The protocol requires only one round of message sending.Moreover,based on the security request of key exchange protocols,a new security definition for attribute-based key exchange protocol is given.The security of the protocol is proved with the standard model.
出处 《现代电子技术》 2011年第15期105-107,共3页 Modern Electronics Technique
关键词 通信技术 基于属性密钥交换 基于属性加密 Sahai-Waters ABE体制 判定性Diffie-Hellman假定 communication technology attribute-based key exchange attribute-based encryption Sahai-Waters ABE system decisional Diffie-Hellman assumption
  • 相关文献

参考文献9

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of The CryptoP84. California, USA.. Santa Barbara 1984: 47-53.
  • 2SAHAI A, WATERS B. Fuzzy identity-based encryption [C]// Proceedings of 2005 Eurocrypt. Berlin: Springer Verlag, 2005: 457-473.
  • 3DIFFIE W, HELLMAN M. New directions in cryptogra- phy[J]. IEEE Transactions on Information Theory, 1976, 22 : 644-654.
  • 4KRAWCZYK H. HMQV: a high-performance secure di- ffie-hellman protocol [C]// Proceedings of CRYPTO 2005 LNCS. Heidelberg: Springer, 2005, 3621: 546-566.
  • 5BOYD C, CLIFF Y, GONZALEZ Nieto, et al. One-round key exchange in the standard model [J]. International Jour- nal of Applied Cryptography, 2009, 1 (3): 181-199.
  • 6LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [C]//Proceedings of 2007 LNCS. Heidelberg: Springer, 2007, 4784: 1-16.
  • 7WANG Hao, XU Qiu-liang, BAN Tao. A provably secure two-party attribute-based key agreement protocol /-C3.// Proceedings of The fifth International Conference on Intelli- gent Information Hiding and Multimedia Signal Processing. Kyoto, Japan: [s. n. ], 2009: 1042-1045.
  • 8BAEK J, SUSILO W, ZHOU J. New constructions of fuzzy identity based encryption [C]// Proceedings of The 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2007: 368-370.
  • 9BELLARE M, ROGAWAY P. Random oracles are practi- cal.. a paradigm for designing efficient protocols[ C]// Pro- ceedings of the 1st ACM Conference on Computer and Com- munications Security. New York: ACM Press, 1993.. 62-77.

同被引文献12

  • 1Sahai A, Waters B. Fuzzy Identity Based Encryption[C]//Proc. of Cryptology-Eurocrypt'05. [S. 1.]: Springer-Verlag, 2005: 457-473.
  • 2Boneh D, Franklin M. Identity Based Encryption from the Well Pairing[C]//Proc. of Cryptology-Crypto'01. IS. 1.]: Springer-Verlag, 2001: 231-229.
  • 3Chen Liqun, Cheng Zhaohui, Smart N P. Identity-based Key Agreement Protocols from Pairings, Cryptology ePrint Archive[EB/OL]. (2006-10-21). http://eprint.iacr.org/2006/ 199.
  • 4王永涛,何明星,郭振洲,等.一个基于身份的密钥协商协议[C]//2006年中国西部青年通信学术会议论文集.成都:四川省电子学会出版社,2006:584-588.
  • 5Ateniese G, Kirsch J, Blanton M. Secret Handshakes with Dynamic and Fuzzy Matching[C]//Proc. of Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2007: 159-177.
  • 6Wang Hao, Xu Qiuliang, Fu Xiu. Two-party Attribute-based Key Agreement Protocol in the Standard Model[C]//Proc. of 2009 International Symposium on Information Processing. Jinan, China: [s. n.], 2009: 325-328.
  • 7Steinwandt R, Corona A S. Attribute-based Group Key Establishment[EB/OL]. (2010-10-20). http://eprint.iacr.org/ 2010/235.
  • 8Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine Grained Access Control of Encrypted Data[C]//Proc. of ACM Conference on Computer and Communications Security. [S. 1.]: ACM Press, 2006: 89-98.
  • 9Beimel A. Secure Schemes Distribution[D]. Haifa, Israel 1996. for Secret Sharing and Key Israel Institute of Technology,.
  • 10Bellare M, Rogaway E Entity Authentication and Key Distribution[C]//Proc. ofCRYPTO'94. [S. 1.]: Springer-Verlag, 1994: 232-249.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部