Predicate-based authenticated key exchange protocol with attribute-hiding
To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new proto...
Saved in:
Main Authors: | Wen-fen LIU, Jiang-hong WEI, Xue-xian HU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.z1.006/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hierarchical certificateless authenticated key agreement protocol
by: Hang SU, et al.
Published: (2016-07-01) -
Efficient handover authentication and secure key-updating mechanism for B5G networks
by: Qimei CUI, et al.
Published: (2021-12-01) -
New affiliation-hiding authenticated key exchange protocol
by: Ya-min WEN, et al.
Published: (2015-09-01) -
Attribute-based authenticated key agreement protocol supporting revocation
by: Qiang LI, et al.
Published: (2014-05-01) -
Searchable encryption scheme based on attribute policy hiding in a cloud environment
by: Yihua ZHOU, et al.
Published: (2022-04-01)