期刊文献+

支持用户撤销的属性认证密钥协商协议 被引量:2

Attribute-based authenticated key agreement protocol supporting revocation
下载PDF
导出
摘要 用户撤销是基于属性的认证密钥协商(ABAKA,attribute-based authenticated key agreement)协议在实际应用中所必需解决的问题。通过将Waters的基于属性的加密方案和Boneh-Gentry-Waters的广播加密方案相结合,提出了一个支持用户撤销的ABAKA协议。该协议能够实现对用户的即时撤销且不需要密钥权威对所有未被撤销的用户私钥进行定期更新。相比于现有的协议,该协议具有较高的通信效率,并能够在标准模型和修改的ABCK模型下可证安全,具有弱的完美前向安全性,并能够抵抗密钥泄露伪装攻击。 Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed. The protocol based on Waters' ciphertext-policy attribute-based encryption and Boneh-Gentry-Waters' broadcast encryption was constructed. In the protocol, revocation can be done immediately without affecting any non-revoked users and does not require users to update keys periodically by interacting with the key authority. Compared with the existing ABAKA protocols, the protocol is more efficient in communication complexity. The protocol is provably secure in the standard model and modified ABCK model. The protocol can also provide weak perfect forward secrecy and key compromise impersonation resilience.
出处 《通信学报》 EI CSCD 北大核心 2014年第5期33-43,共11页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2013CB338003) 国家高技术研究发展计划("863"计划)基金资助项目(2012AA01A403) 国家自然科学基金资助项目(91118006)~~
关键词 认证 密钥协商 基于属性 密钥撤销 标准模型 authentication key agreement attribute-based key revocation standard model
  • 相关文献

参考文献19

  • 1SAHAI A, WATERS B. Fuzzy identity-based eneryption[A]. Cryptol- ogy-EUROCRYPT 2005[C]. Berlin: Springer-Verlag, 2005.457-473.
  • 2GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based eneryption for f'me-grained access control of encrypted data[A]. Proceedings of the 13th ACM Conference on Computer and Communications Secu- rity[C]. New York: ACM, 2006. 89-98.
  • 3BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attrib- ute-based encryption[A]. Proceedings of the 2007 IEEE Symposium on Security and Privacy[C]. Washington DC, 2007.321-334.
  • 4WATERS B. Cipbertext-policy attribute-based encryption: an expres- sive, efficient, and provably secure realization[A]. PKC 2011[C]. Springer, Heidelberg ,2011.53-70.
  • 5LI J, AU M H, SUSILO W, et al. Attribute-based signature and its applications[A]. ASIACCS 2010[C].2010.60-69.
  • 6OKAMOTO T, TAKASHIMA K. Efficient attribute-based signatures for non-monotone predicates in the standard model[A]. PKC 2011 [C]. Springer, Heidelberg ,2011.35-52.
  • 7WANG H, XU Q, BAN T. A provably secure two-party attribute-based key agreement protocol[A]. IIH-MSP 2009[C]. 2009.1042-1045.
  • 8WANG H, XU Q, FU X. Two-party attribute-based key agreement protocol in the standard model[A]. ISIP 2009[C]. 2009. 325-328.
  • 9WANG H, XU Q, FU X. Revocable attribute-based key agreement protocol without random oracles[A]. JNW 4[C]. 2009.787-794.
  • 10YONEYAMA K. Slxongly secure two-pass attribute-based authenti- cated key exchange[A]. Pairing 2010[C]. Springer, Heidelberg, 2010.147-166.

二级参考文献56

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献97

同被引文献6

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部