Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 444-446, 469.

Previous Articles     Next Articles

Efficient Attribute Based Key Agreement Protocol

CHEN Jian, WANG Xiao-ying, WANG Yong-tao and LI Yao-sen   

  • Online:2018-11-14 Published:2018-11-14

Abstract: We proposed an efficient attribute based key agreement protocol.Due to the property of fuzzy identification on the participants of the protocol,attribute based key agreement protocol has been a hot topic of research in recent years.We presented a concrete construct of a two-party efficient attribute based key agreement protocol,based on the key abstraction of the most efficient attribute based encryption scheme at present.The new protocol achieves more expressive access structure and is effcient.Futhermore,the new protocol was proved secure in the standard model under the decisional q-parallel bilinear diffie-hellman exponent assumption(BDHE).

Key words: Access structure,Attribute based encryption,Key exchange,Fuzzy idenfication,Standard model

[1] Sahai A,Waters B.Fuzzy identity based encryption:Advances in Cryptology-Eurocrypt 2005[C]∥LNCS Berlin:Springer-Verlag,2005,4:457-473
[2] Beimel A.Secure schemes for secret sharing and key distribution[D].Haifa:Israel Institute of Technology,1996
[3] Wang Hao,Xu Qiu-liang,Fu Xiu.Two-Party attribute-based key agreement protocol in the standard model[C]∥the 2009 International Symposium on Information Processing(ISIP’09).Finland:Academy Publisher,2009:325-328
[4] Wang Hao,Xu Qiu-liang,Fu Xiu.Revocable attribute-based key agreement protocol without random oracles[J].Journal of Networks,2009,4(8):787-794
[5] 王永涛,宋璟,贺强,等.一个基于属性的密钥协商协议[J].计算机工程,2014,40(2):134-139
[6] 魏江宏,刘文芬,胡学先.全安全的属性基认证密钥协商协议[J].计算机应用,2012,32(1):.38-41
[7] 王永涛,封维端,刘孝男,等.一个消息策略基于属性的密钥协商协议[J].计算机科学,2013,40(9):106-110
[8] Waters B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]∥PKC,LNCS,vol.6571,Berlin:Springer-Verlag,2011:53-70
[9] Boneh D,Franklin M.Identity based encryption from the Weil pairing:Advances in Cryptology- Crypto 2001[C]∥LNCS,vol.2139,Berlin:Springer-Verlag,2001:231-229
[10] Beimel A.Secure Schemes for Secret Sharing and Key Distribution[D].Israel Institute of Technology,Technion,Haifa,Israel,1996
[11] Chen Li-qun,Cheng Zhao-hui,Smart N P.Identity-based Key Agreement Protocols From Pairings.Cryptology ePrint Archive.
[12] Bellare M,Rogaway P.Entity authentication and key distribution:Advances in Cryptology-CRYPTO 1993[C]∥LNCS,vol.773,Berlin:Springer-Verlag,1994:232-249

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .