Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage

被引:0
作者
Fujioka, Atsushi [1 ]
Suzuki, Koutarou [1 ]
Yoneyama, Kazuki [1 ]
机构
[1] NTT Informat Sharing Platform Labs, Musashino, Tokyo 1808585, Japan
来源
INFORMATION SECURITY APPLICATIONS | 2011年 / 6513卷
关键词
predicate-based AKE; eCK security; ENCRYPTION; PROTOCOLS; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide the first eCK security model for predicate-based authenticated key exchange (AKE) to guarantee resistance to leakage of ephemeral secret keys. We also propose an two-pass attribute-based AKE protocol secure in the proposed predicate-based eCK security model based on a attribute-based encryption. The proposed protocol has advantages in security against leakage of ephemeral secret keys and the round complexity compared to the previous predicate-based AKE protocol.
引用
收藏
页码:15 / 30
页数:16
相关论文
共 18 条
[1]  
Ateniese G., 2007, NDSS 2007
[2]  
Baek J, 2005, LECT NOTES COMPUT SC, V3386, P380
[3]  
Bellare M., 1994, CRYPTO, P232
[4]  
Birkett J, 2010, LECT NOTES COMPUT SC, V6168, P282, DOI 10.1007/978-3-642-14081-5_18
[5]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[6]  
Boyd C, 2005, LECT NOTES COMPUT SC, V3715, P229
[7]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[8]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241
[9]  
Gorantla MC, 2010, LECT NOTES COMPUT SC, V6168, P300, DOI 10.1007/978-3-642-14081-5_19
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1