期刊文献+

全安全的属性基认证密钥交换协议 被引量:3

Fully secure attribute-based authenticated key exchange protocol
下载PDF
导出
摘要 因在细粒度访问控制、定向广播等方面的广泛应用,基于属性的密码机制逐渐受到关注。以一个全安全的属性基加密(ABE)机制为基本构件,结合NAXOS技巧,提出了一个全安全的属性基认证密钥交换协议,并利用可证明安全理论在基于属性的eCK模型中进行了严格的形式化证明。相比已有的同类协议,提出的协议具有更高的安全性,并在提供丰富的属性认证策略的同时,减小了通信开销。 Attribute-Based Encryption(ABE) scheme has been drawing attention for having a broad application in the area of fine-grained access control,directed broadcast,and so on.Combined with NAXOS technique,this paper proposed a fully secure Attribute-Based Authenticated Key Exchange(ABAKE) protocol based on an ABE scheme,and gave a detailed security proof in the Attribute-Based eCK(ABeCK) model by provable security theory.Compared with other similar protocols,the proposed protocol obtains stronger security and flexible attribute authentication policy,while decreasing communications cost.
出处 《计算机应用》 CSCD 北大核心 2012年第1期38-41,共4页 journal of Computer Applications
基金 国家973计划项目(2012CB315905)
关键词 属性基加密 访问结构 密钥交换 ABeCK模型 Attribute-Based Encryption(ABE) access structure key exchange Attribute-Based eCK(ABeCK) model
  • 相关文献

参考文献10

  • 1ATENIESE G, KIRSCH J, BLANTON M. Secret handshakes with dynamic and fuzzy matching [C]//NDSS 2007: Proceedings of the Network and Distributed System Security Symposium. San Diego:USENIX Association, 2007:159 - 177.
  • 2童国强.清香型小曲酒装瓶后贮存过程中酒质变化的研究[J].酿酒科技,2002(5):35-37. 被引量:4
  • 3BIRKETT J, STEBILA D. Predicate-based key exchange [C]// Proceedings of Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2010:282-299.
  • 4WATERS B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [ C]//PKC'11: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Berlin: Springer-Verlag, 2011:53-70.
  • 5YONEYAMA K. Strongly secure two-pass attribute-based authenticated key exchange [C]// Pairing'10: Proceedings of the 4th International Conference on Pairing-based Cryptography. Berlin: Springer- Verlag, 2010:147 - 166.
  • 6LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption [C]// Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2010:62-91.
  • 7LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [C]// ProvSec'07: Proceedings of the 1st International Conference on Provable Security. Berlin: Springer- Verlag, 2007:1 - 16.
  • 8BEIMEL A. Secure schemes for secret sharing and key distribution [D]. Haifa: Israel Institute of Technology, 1996.
  • 9WATERS B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions [C]//Advances in Cryptology -CRYPTO 2009, 29th Annual International Cryptology Conference. Berlin: Springer-Verlag, 2009:619-636.
  • 10OKAMOTO T, POINTCHEVAL D. The gap-problems: A new class of problems for the security of cryptographic schemes [ C ]// PKC 2001 : Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Berlin: Springer-Verlag, 2001 : 104 - 118.

二级参考文献1

共引文献3

同被引文献36

  • 1朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 2赵永哲,姜占华,黄声烈.基于F_2上遍历矩阵的Shamir三次传递协议的实现[J].小型微型计算机系统,2006,27(6):986-991. 被引量:11
  • 3Sahai A,Waters B.Fuzzy identity based encryption[A]∥Advances in Cryptology-Eurocrypt 2005[C].LNCS vol.3494,Berlin:Springer-Verlag,2005:457-473.
  • 4Goyal V,Pandey O,Sahai A,et al.Attribute-based encryptionfor fine grained access control of encrypted data[A]∥the 13th ACM Conference on Computer and Communications Security- CCS 2006[C].New York:ACM Press,2006:89-98.
  • 5Cheung L,Newport C.Porvably secure ciphertext policy ABE[A]∥the 14th ACM Conference on Computer and Communications Security-CCS 2007[C].New York:ACM Press,2007:456-465.
  • 6Wang Hao,Xu Qiu-liang,Fu Xiu.Two-Party attribute-basedkey agreement protocol in the standard model[A]∥the 2009International Symposium on Information Processing- ISIP'09[C].Finland:Academy Publisher,2009:325-328.
  • 7Wang Hao,Xu Qiu-liang,Fu Xiu.Revocable attribute-based key agreement protocol without random oracles[J].Journal of Networks,2009,4(8):787-794.
  • 8Steinwandt R,Corona A S.Attribute-based group key establishment.Cryptology ePrint archive.http://eprint.iacr.org/2010/235,2010.
  • 9Boneh D,Franklin M.Identity based encryption from the Weil pairing[A]∥Advances in Cryptology- Crypto 2001[C].LNCS,vol.2139,Berlin:Springer-Verlag,2001:231-229.
  • 10Beimel A.Secure schemes for secret sharing and key distribution[D].Haifa:Israel Institute of Technology,1996.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部