期刊文献+

一个基于属性的密钥协商协议

An Attribute-based Key Agreement Protocol
下载PDF
导出
摘要 在基于属性加密方案的基础上,提出一个基于属性的密钥协商协议。讨论基于属性的密钥协商协议的特性及可能的应用背景,其具有可实现模糊鉴别的特性,所实现的密钥策略为访问树结构。分析协议的安全属性并给出安全性证明,结果表明,与已有的协议相比,该协议可实现较复杂的访问结构,同时在标准模型下,基于判定双线形Diffie-Hellman假定证明了协议的安全性。 This paper proposes a two-party key policy attribute-based key agreement protocol on the basis of attribute based encryption scheme. It discusses some properties and potential applications of key policy attribute based key agreement protocol with the characteristics of fuzzy identification, key policy is access tree structure. It analyzes the security attributes of the protocol and gives the rigorous proof of security. Results show that, comparing with previous protocols, the new protocol achieves more complex access structure and is proved secure in the standard model under the Decisional Bilinear Diffie-Hellman(DBDH) assumption.
出处 《计算机工程》 CAS CSCD 2014年第2期134-139,共6页 Computer Engineering
基金 国家自然科学基金资助项目(61202493)
关键词 密钥策略 基于属性加密 密钥协商协议 双线性对 访问结构 标准模型 key policy Attribute-based Encryption(ABE) key agreement protocol bilinear paring access structure standard model
  • 相关文献

参考文献13

  • 1Sahai A, Waters B. Fuzzy Identity Based Encryption[C]//Proc. of Cryptology-Eurocrypt'05. [S. 1.]: Springer-Verlag, 2005: 457-473.
  • 2Boneh D, Franklin M. Identity Based Encryption from the Well Pairing[C]//Proc. of Cryptology-Crypto'01. IS. 1.]: Springer-Verlag, 2001: 231-229.
  • 3Chen Liqun, Cheng Zhaohui, Smart N P. Identity-based Key Agreement Protocols from Pairings, Cryptology ePrint Archive[EB/OL]. (2006-10-21). http://eprint.iacr.org/2006/ 199.
  • 4王永涛,何明星,郭振洲,等.一个基于身份的密钥协商协议[C]//2006年中国西部青年通信学术会议论文集.成都:四川省电子学会出版社,2006:584-588.
  • 5Ateniese G, Kirsch J, Blanton M. Secret Handshakes with Dynamic and Fuzzy Matching[C]//Proc. of Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2007: 159-177.
  • 6Wang Hao, Xu Qiuliang, Fu Xiu. Two-party Attribute-based Key Agreement Protocol in the Standard Model[C]//Proc. of 2009 International Symposium on Information Processing. Jinan, China: [s. n.], 2009: 325-328.
  • 7任勇军,王建东,庄毅,谭沧海,方黎明.基于属性的认证密钥协商协议[J].兰州大学学报(自然科学版),2010,46(2):103-110. 被引量:2
  • 8徐军华,郝云芳.可证安全的基于属性密钥交换[J].现代电子技术,2011,34(15):105-107. 被引量:1
  • 9魏江宏,刘文芬,胡学先.全安全的属性基认证密钥交换协议[J].计算机应用,2012,32(1):38-41. 被引量:3
  • 10Steinwandt R, Corona A S. Attribute-based Group Key Establishment[EB/OL]. (2010-10-20). http://eprint.iacr.org/ 2010/235.

二级参考文献20

  • 1ATENIESE G, KIRSCH J, BLANTON M. Secret handshakes with dynamic and fuzzy matching [C]//NDSS 2007: Proceedings of the Network and Distributed System Security Symposium. San Diego:USENIX Association, 2007:159 - 177.
  • 2BIRKETT J, STEBILA D. Predicate-based key exchange [C]// Proceedings of Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2010:282-299.
  • 3WATERS B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization [ C]//PKC'11: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Berlin: Springer-Verlag, 2011:53-70.
  • 4YONEYAMA K. Strongly secure two-pass attribute-based authenticated key exchange [C]// Pairing'10: Proceedings of the 4th International Conference on Pairing-based Cryptography. Berlin: Springer- Verlag, 2010:147 - 166.
  • 5LEWKO A, OKAMOTO T, SAHAI A, et al. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption [C]// Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer-Verlag, 2010:62-91.
  • 6LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [C]// ProvSec'07: Proceedings of the 1st International Conference on Provable Security. Berlin: Springer- Verlag, 2007:1 - 16.
  • 7BEIMEL A. Secure schemes for secret sharing and key distribution [D]. Haifa: Israel Institute of Technology, 1996.
  • 8WATERS B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions [C]//Advances in Cryptology -CRYPTO 2009, 29th Annual International Cryptology Conference. Berlin: Springer-Verlag, 2009:619-636.
  • 9OKAMOTO T, POINTCHEVAL D. The gap-problems: A new class of problems for the security of cryptographic schemes [ C ]// PKC 2001 : Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography. Berlin: Springer-Verlag, 2001 : 104 - 118.
  • 10SHAMIR A. Identity-based cryptosystems and signature schemes [C]// Proceedings of The CryptoP84. California, USA.. Santa Barbara 1984: 47-53.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部