Predicate-based authenticated key exchange protocol with attribute-hiding

To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new proto...

Full description

Saved in:
Bibliographic Details
Main Authors: Wen-fen LIU, Jiang-hong WEI, Xue-xian HU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.006/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539878310903808
author Wen-fen LIU
Jiang-hong WEI
Xue-xian HU
author_facet Wen-fen LIU
Jiang-hong WEI
Xue-xian HU
author_sort Wen-fen LIU
collection DOAJ
description To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new protocol could be reduced to GBDH assumption in the modified eCK model.At the same time,for inheriting the security property of attribute-hiding from the inner product encryption scheme,the proposed protocol guarded against disclosure of users’ sensitive information.
format Article
id doaj-art-bf69f6fb6062433f82cf5827d35740be
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-bf69f6fb6062433f82cf5827d35740be2025-01-14T06:33:42ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-0133414759667148Predicate-based authenticated key exchange protocol with attribute-hidingWen-fen LIUJiang-hong WEIXue-xian HUTo overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new protocol could be reduced to GBDH assumption in the modified eCK model.At the same time,for inheriting the security property of attribute-hiding from the inner product encryption scheme,the proposed protocol guarded against disclosure of users’ sensitive information.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.006/key exchange protocolpredicate authenticationattribute-hidingeCK model
spellingShingle Wen-fen LIU
Jiang-hong WEI
Xue-xian HU
Predicate-based authenticated key exchange protocol with attribute-hiding
Tongxin xuebao
key exchange protocol
predicate authentication
attribute-hiding
eCK model
title Predicate-based authenticated key exchange protocol with attribute-hiding
title_full Predicate-based authenticated key exchange protocol with attribute-hiding
title_fullStr Predicate-based authenticated key exchange protocol with attribute-hiding
title_full_unstemmed Predicate-based authenticated key exchange protocol with attribute-hiding
title_short Predicate-based authenticated key exchange protocol with attribute-hiding
title_sort predicate based authenticated key exchange protocol with attribute hiding
topic key exchange protocol
predicate authentication
attribute-hiding
eCK model
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.006/
work_keys_str_mv AT wenfenliu predicatebasedauthenticatedkeyexchangeprotocolwithattributehiding
AT jianghongwei predicatebasedauthenticatedkeyexchangeprotocolwithattributehiding
AT xuexianhu predicatebasedauthenticatedkeyexchangeprotocolwithattributehiding