Predicate-based authenticated key exchange protocol with attribute-hiding
To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new proto...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.006/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539878310903808 |
---|---|
author | Wen-fen LIU Jiang-hong WEI Xue-xian HU |
author_facet | Wen-fen LIU Jiang-hong WEI Xue-xian HU |
author_sort | Wen-fen LIU |
collection | DOAJ |
description | To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new protocol could be reduced to GBDH assumption in the modified eCK model.At the same time,for inheriting the security property of attribute-hiding from the inner product encryption scheme,the proposed protocol guarded against disclosure of users’ sensitive information. |
format | Article |
id | doaj-art-bf69f6fb6062433f82cf5827d35740be |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-bf69f6fb6062433f82cf5827d35740be2025-01-14T06:33:42ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-09-0133414759667148Predicate-based authenticated key exchange protocol with attribute-hidingWen-fen LIUJiang-hong WEIXue-xian HUTo overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new protocol could be reduced to GBDH assumption in the modified eCK model.At the same time,for inheriting the security property of attribute-hiding from the inner product encryption scheme,the proposed protocol guarded against disclosure of users’ sensitive information.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.006/key exchange protocolpredicate authenticationattribute-hidingeCK model |
spellingShingle | Wen-fen LIU Jiang-hong WEI Xue-xian HU Predicate-based authenticated key exchange protocol with attribute-hiding Tongxin xuebao key exchange protocol predicate authentication attribute-hiding eCK model |
title | Predicate-based authenticated key exchange protocol with attribute-hiding |
title_full | Predicate-based authenticated key exchange protocol with attribute-hiding |
title_fullStr | Predicate-based authenticated key exchange protocol with attribute-hiding |
title_full_unstemmed | Predicate-based authenticated key exchange protocol with attribute-hiding |
title_short | Predicate-based authenticated key exchange protocol with attribute-hiding |
title_sort | predicate based authenticated key exchange protocol with attribute hiding |
topic | key exchange protocol predicate authentication attribute-hiding eCK model |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.006/ |
work_keys_str_mv | AT wenfenliu predicatebasedauthenticatedkeyexchangeprotocolwithattributehiding AT jianghongwei predicatebasedauthenticatedkeyexchangeprotocolwithattributehiding AT xuexianhu predicatebasedauthenticatedkeyexchangeprotocolwithattributehiding |