标准模型下可证安全的属性基认证密钥交换协议
作者:
基金项目:

国家重点基础研究发展计划(973)(2012CB315905)


Provable Secure Attribute Based Authenticated Key Exchange Protocols in the Standard Model
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [12]
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    在Waters的属性基加密方案的基础上,提出了一个在标准模型下可证安全的两方属性基认证密钥交换协议.在修改的BJM模型中,给出了所提协议在判定性双线性Diffie-Hellman假设下的安全性证明.此外,针对无会话密钥托管的应用需求,在基本协议的基础上,构造了能够有效防止会话密钥托管的属性基认证密钥交换协议.在计算效率方面,所提协议与现有的仅在随机预言模型下可证安全的属性基认证密钥交换协议相当.

    Abstract:

    Based on Waters' attribute based encryption scheme, this paper proposes a two-party attribute based authenticated key exchange protocol with provable security in the standard model. The detailed proof of the security is presented in the modified BJM model under the decisional bilinear Diffie-Hellman assumption. In addition, to satisfy the requirement that the session key should not be escrowed by the trusted third party, a new protocol, which can cancel the escrow of the session key, is constructed from the basic protocol. The computation efficiency of the proposed protocols is nearly equivalent to the computation efficiency of the available ABAKE protocols with provable secure attribute in the random oracle model.

    参考文献
    [1] Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-Eurocrypt 2005. LNCS 3494, Berlin: Springer-Verlag, 2005. 457-473. [doi: 10.1007/11426639_27]
    [2] Su JS, Cao D, Wang XF, Sun YP, Hu QL. Attribute-Based encryption schemes. Ruan Jian Xue Bao/Journal of Software, 2011, 22(6):1299-1315 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3993.htm [doi: 10.3724/SP.J.1001.2011. 03993]
    [3] Ateniese G, Kirsch J, Blanton M. Secret handshakes with dynamic and fuzzy matching. In: Arbaugh W, ed. Proc. of the NDSS 2007. 2007. 159-177.
    [4] Wang H, Xu Q, Ban T. A provably secure two-party attribute-based key agreement protocol. In: Sakano H, ed. Proc. of the IIH-MSP 2009. New York: IEEE Computer Society, 2009. 1042-1045. [doi: 10.1109/IIH-MSP.2009.92]
    [5] Yoneyama K. Strongly secure two-pass attribute-based authenticated key exchange. In: Joye M, ed. Proc. of the Paring 2010. LNCS 6487, Berlin: Springer-Verlag, 2010. 147-166. [doi: 10.1007/978-3-642-17455-1_10]
    [6] Waters B. Ciphertext-Policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano D, ed. Proc. of the PKC 2011. LNCS 6571, Berlin: Springer-Verlag, 2011. 53-70. [doi: 10.1007/978-3-642-19379-8_4]
    [7] Wang SB, Cao ZF, Dong X. Provably secure identity based authenticated key agreement protocols in the standard model. Chinese Journal of Computers, 2007,30(10):1842-1852 (in Chinese with English abstract).
    [8] Chen L, Cheng Z, Smart NP. Identity-Based key agreement protocols from pairings. Int'l Journal of Information Security, 2007, 6(4):213-241. [doi: 10.1007/s10207-006-0011-9]
    [9] Gao ZG, Feng DG. Efficient identity-based authenticated key agreement protocol in the standard model. Ruan Jian Xue Bao/ Journal of Software, 2011,22(5):1031-1040 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3828.htm [doi: 10. 3724/SP.J.1001.2011.03828]
    [10] Beimel A. Secure schemes for secret sharing and key distribution [Ph.D. Thesis]. Haifa: Israel Institute of Technology, 1996.
    [11] Blake S, Johnson C, Menezes A. Key agreement protocols and their security analysis. In: Darnell M, ed. Proc. of the 6th IMA Int'l Conf. on Cryptography and Coding. LNCS 1335, Berlin: Springer-Verlag, 1997. 30-45. [doi: 10.1007/BFb0024447]
    [12] The pairing-based cryptography library. http://crypto.stanford.edu/pbc/
    相似文献
    引证文献
引用本文

魏江宏,刘文芬,胡学先.标准模型下可证安全的属性基认证密钥交换协议.软件学报,2014,25(10):2397-2408

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2012-07-02
  • 最后修改日期:2013-09-26
  • 在线发布日期: 2014-09-30
文章二维码
您是第19780749位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号