计算机科学 ›› 2015, Vol. 42 ›› Issue (Z6): 444-446.

• 信息安全 • 上一篇    下一篇

一个高效的属性基密钥协商协议

陈健,王小英,王永涛,李尧森   

  1. 防灾科技学院教务处 三河065201,防灾科技学院灾害信息工程系 三河065201,中国信息安全测评中心 北京100085,防灾科技学院教务处 三河065201
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受河北省人文社会科学类青年基金项目(SQ137005)资助

Efficient Attribute Based Key Agreement Protocol

CHEN Jian, WANG Xiao-ying, WANG Yong-tao and LI Yao-sen   

  • Online:2018-11-14 Published:2018-11-14

摘要: 提出一个高效的属性基密钥协商协议。由于属性基密钥协商协议具有模糊鉴别的特性,近年来成为密钥协商协议的研究热点。基于当前最高效的属性基加密方案的密钥提取形式,构建了一个两方高效的属性基密钥协商协议。新协议实现了较丰富的访问结构且计算效率较高,同时在标准模型下基于判定q并行双线性Diffie-Hellman指数假定(Decisional q-parallel Bilinear Diffie-Hellman Exponent Assumption)证明了协议的安全性。

Abstract: We proposed an efficient attribute based key agreement protocol.Due to the property of fuzzy identification on the participants of the protocol,attribute based key agreement protocol has been a hot topic of research in recent years.We presented a concrete construct of a two-party efficient attribute based key agreement protocol,based on the key abstraction of the most efficient attribute based encryption scheme at present.The new protocol achieves more expressive access structure and is effcient.Futhermore,the new protocol was proved secure in the standard model under the decisional q-parallel bilinear diffie-hellman exponent assumption(BDHE).

Key words: Access structure,Attribute based encryption,Key exchange,Fuzzy idenfication,Standard model

[1] Sahai A,Waters B.Fuzzy identity based encryption:Advances in Cryptology-Eurocrypt 2005[C]∥LNCS Berlin:Springer-Verlag,2005,4:457-473
[2] Beimel A.Secure schemes for secret sharing and key distribution[D].Haifa:Israel Institute of Technology,1996
[3] Wang Hao,Xu Qiu-liang,Fu Xiu.Two-Party attribute-based key agreement protocol in the standard model[C]∥the 2009 International Symposium on Information Processing(ISIP’09).Finland:Academy Publisher,2009:325-328
[4] Wang Hao,Xu Qiu-liang,Fu Xiu.Revocable attribute-based key agreement protocol without random oracles[J].Journal of Networks,2009,4(8):787-794
[5] 王永涛,宋璟,贺强,等.一个基于属性的密钥协商协议[J].计算机工程,2014,40(2):134-139
[6] 魏江宏,刘文芬,胡学先.全安全的属性基认证密钥协商协议[J].计算机应用,2012,32(1):.38-41
[7] 王永涛,封维端,刘孝男,等.一个消息策略基于属性的密钥协商协议[J].计算机科学,2013,40(9):106-110
[8] Waters B.Ciphertext-policy Attribute-based Encryption:An Expressive,Efficient,and Provably Secure Realization[C]∥PKC,LNCS,vol.6571,Berlin:Springer-Verlag,2011:53-70
[9] Boneh D,Franklin M.Identity based encryption from the Weil pairing:Advances in Cryptology- Crypto 2001[C]∥LNCS,vol.2139,Berlin:Springer-Verlag,2001:231-229
[10] Beimel A.Secure Schemes for Secret Sharing and Key Distribution[D].Israel Institute of Technology,Technion,Haifa,Israel,1996
[11] Chen Li-qun,Cheng Zhao-hui,Smart N P.Identity-based Key Agreement Protocols From Pairings.Cryptology ePrint Archive.http://eprint.iacr.org/2006/199
[12] Bellare M,Rogaway P.Entity authentication and key distribution:Advances in Cryptology-CRYPTO 1993[C]∥LNCS,vol.773,Berlin:Springer-Verlag,1994:232-249

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!