Efficient single round attribute-based authenticated key exchange protocol

被引:2
作者
Chakraborty, Suvradip [1 ]
Rao, Sreenivasa Y. [2 ]
Pandu Rangan, C. [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[2] Natl Inst Technol, Dept Math, Warangal, Andhra Pradesh, India
关键词
Attribute-based signcryption; authenticated key exchange; attribute-based signature; bilinear pairing; attribute-based extended canetti-krawzyck (ABeCK) model; PERSONAL HEALTH RECORDS; SIGNCRYPTION; SIGNATURES; SECURE;
D O I
10.1080/23799927.2021.1873192
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-Based Authenticated Key Exchange (ABAKE) protocols allow two or more users to establish a shared key and achieve mutual authentication over an insecure network, while providing fine-grained access control over transmitted data. The existing ABAKE protocols are very inefficient, requiring a large number (polynomial in the size of the access policies) of pairing and exponentiation operations. This presents a major hindrance in the real-world deployment of these protocols. In this work, we present a construction of ABAKE protocol where the number of pairing operations is constant (to be precise only 7) and the number of exponentiation operations is linear to the number of clauses in the disjunctive normal form representing the general access policies. To this end, we construct an Attribute-Based Signcryption (ABSC) scheme with constant number of pairings, and use it as the main building block in our ABAKE construction. This also gives the first construction of ABSC schemes with constant number of pairings for general purpose access policies in the standard model. Another important and desirable feature of our ABAKE construction is that it is round-optimal, i.e. it is a single round protocol. We analyse the security of our ABAKE construction in the Attribute-Based extended Canetti-Krawzyck (ABeCK) model, and prove its security assuming the hardness of a variant of the Bilinear Diffie-Hellman Exponent problem in the random oracle model.
引用
收藏
页码:313 / 336
页数:24
相关论文
共 32 条
[1]  
Belguith S., 2017, P 14 INT C SEC CRYPT, V6, P212
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Birkett J., 2010, PREDICATE BASED KEY, P282
[4]   An Efficient Attribute-Based Authenticated Key Exchange Protocol [J].
Chakraborty, Suvradip ;
Rao, Y. Sreenivasa ;
Rangan, Chandrasekaran Pandu .
CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 :493-503
[5]  
Emura Keita, 2012, International Journal of Applied Cryptography, V2, P199, DOI 10.1504/IJACT.2012.045589
[6]  
Gagne Martin, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P295, DOI 10.1007/978-3-642-36334-4_19
[7]  
Gagné M, 2010, LECT NOTES COMPUT SC, V6280, P154, DOI 10.1007/978-3-642-15317-4_11
[8]  
Gentry C., 2014, IACR Cryptology ePrint Archive, V2014, P929
[9]  
Gorantla MC, 2010, LECT NOTES COMPUT SC, V6168, P300, DOI 10.1007/978-3-642-14081-5_19
[10]  
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418