Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key

被引:7
|
作者
Li, Jiguo [1 ,2 ,3 ]
Hu, Shengzhou [2 ,4 ]
Zhang, Yichen [1 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350112, Fujian, Peoples R China
[2] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Jiangsu, Peoples R China
[4] Gannan Normal Univ, Math & Comp Sci Dept, Ganzhou 341000, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
CP-ABE; BROADCAST ENCRYPTION; SECURITY; PRIVACY;
D O I
10.1155/2018/8738960
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on mutual authentication, the session key is established for communication nodes on the open network. In order to satisfy fine-grained access control for cloud storage, the two-party attribute-based key agreement protocol (TP-AB-KA) was proposed. However, the existing TP-AB-KA protocol is high in the cost of computation and communication and is not unfit for application in a mobile cloud setting because mobile devices are generally resource constrained. To solve the above issue, we propose a TP-AB-KA protocol with constant-size ciphertext and key. Our TP-AB-KA protocol is provable security in the standard model. The concrete proof is given under the augmented multisequence of exponents' decisional Diffie-Hellman (aMSE-DDH) hypothesis in the attribute-based BJM model (AB-BJM). Compared with the existing TP-AB-KA protocols, the computation cost and communication cost of our protocol are largely reduced.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Two-Party Attribute-based Key Agreement Protocol in the Standard Model
    Wang, Hao
    Xu, QiuLiang
    Fu, Xiu
    ISIP: 2009 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING, PROCEEDINGS, 2009, : 325 - 328
  • [2] Expressive attribute-based keyword search with constant-size ciphertext
    Han, Jinguang
    Yang, Ye
    Liu, Joseph K.
    Li, Jiguo
    Liang, Kaitai
    Shen, Jian
    SOFT COMPUTING, 2018, 22 (15) : 5163 - 5177
  • [3] Expressive attribute-based keyword search with constant-size ciphertext
    Jinguang Han
    Ye Yang
    Joseph K. Liu
    Jiguo Li
    Kaitai Liang
    Jian Shen
    Soft Computing, 2018, 22 : 5163 - 5177
  • [4] Expressive Key-policy Attribute-based Constant-size Signature
    Rani, Shikha
    Ali, Syed Taqi
    2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 101 - 104
  • [5] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83
  • [6] Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
    Teng, Wei
    Yang, Geng
    Xiang, Yang
    Zhang, Ting
    Wang, Dongyang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 617 - 627
  • [7] A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext
    Wang, Chang-Ji
    Luo, Jian-Fa
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 447 - 451
  • [8] Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
    Chen, Cheng
    Zhang, Zhenfeng
    Feng, Dengguo
    PROVABLE SECURITY, 2011, 6980 : 84 - 101
  • [9] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [10] An attribute-based tripartite key agreement protocol
    Bayat, Majid
    Aref, Mohammad Reza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (08) : 1419 - 1431