Advanced Search
Volume 34 Issue 2
Mar.  2012
Turn off MathJax
Article Contents
Wei Jiang-Hong, Hu Xue-Xian, Liu Wen-Fen. Attribute-based Authenticated Key Exchange Protocol in Multiple Attribute Authorities Environment[J]. Journal of Electronics & Information Technology, 2012, 34(2): 451-456. doi: 10.3724/SP.J.1146.2011.00701
Citation: Wei Jiang-Hong, Hu Xue-Xian, Liu Wen-Fen. Attribute-based Authenticated Key Exchange Protocol in Multiple Attribute Authorities Environment[J]. Journal of Electronics & Information Technology, 2012, 34(2): 451-456. doi: 10.3724/SP.J.1146.2011.00701

Attribute-based Authenticated Key Exchange Protocol in Multiple Attribute Authorities Environment

doi: 10.3724/SP.J.1146.2011.00701 cstr: 32379.14.SP.J.1146.2011.00701
  • Received Date: 2011-07-08
  • Rev Recd Date: 2011-10-24
  • Publish Date: 2012-02-19
  • Available Attribute-Based Authenticated Key Exchange (ABAKE) protocols are all designed in the single Attribute Authority (AA) environment. However, secure communication is in demand between parties from different Attribute Authorities (AAs). Based on Waters attribute-based encryption scheme, an ABAKE protocol is proposed in multiple AAs environment and the security of the proposed protocol is reduced to Gap Bilinear Diffie-Hellman (GBDH) and Computational Diffie-Hellman (CDH) assumptions in the Attribute-Based extended Canetti-Krawczyk (ABeCK) model. Moreover, the scheme, which transmits attribute authentication policy represented by linear secret sharing scheme via Boolean formulas, can express flexible policies and decrease communication cost drastically.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2372) PDF downloads(950) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return