321
Views
2
CrossRef citations to date
0
Altmetric
Mathematics of Cryptography and Coding in the Quantum Era

Efficient single round attribute-based authenticated key exchange protocol

ORCID Icon, ORCID Icon &
Pages 313-336 | Received 17 Jul 2020, Accepted 31 Dec 2020, Published online: 28 Jan 2021

References

  • S. Belguith, N. Kaaniche, M. Laurent, A. Jemai, and R. Attia, Constant-size threshold attribute based signcryption for cloud applications, SECRYPT 2017 : 14th International Conference on Security and Cryptography, Vol. 6, Scitepress, Madrid, Spain, 2017, pp. 212–225.
  • J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, Security and Privacy, 2007. SP'07. IEEE Symposium on, IEEE, 2007, pp. 321–334.
  • J. Birkett and D. Stebila, Predicate-based key exchange, Information Security and Privacy, Springer, 2010, pp. 282–299.
  • S. Chakraborty, Y.S. Rao, and C.P. Rangan, An efficient attribute-based authenticated key exchange protocol, in Cryptology and Network Security, S. Capkun, and S. S. M. Chow, eds., Springer International Publishing, Cham, 2018, pp. 493–503.
  • K. Emura, A. Miyaji, and M.S. Rahman, Dynamic attribute-based signcryption without random oracles, Int. J. Appl. Cryptol. 2 (2012), pp. 199–211.
  • M. Gagné, S. Narayan, and R. Safavi-Naini, Threshold attribute-based signcryption, in Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, J. A. Garay, and R. De Prisco, eds., Springer, Berlin Heidelberg, 2010, pp. 154–171.
  • M. Gagné, S. Narayan, and R. Safavi-Naini, Short pairing-efficient threshold-attribute-based signature, International Conference on Pairing-Based Cryptography, Springer, 2012, pp. 295–313.
  • C. Gentry, S. Halevi, H.K. Maji, and A. Sahai, Zeroizing without zeroes: cryptanalyzing multilinear maps without encodings of zero, IACR Cryptology EPrint Archive 2014 (2014), pp. 929.
  • M.C. Gorantla, C. Boyd, and J.M.G. Nieto, Attribute-based authenticated key exchange, Information Security and Privacy, Springer, 2010, pp. 300–317.
  • V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on computer and communications security, Acm, 2006, pp. 89–98.
  • H. Krawczyk, Cryptographic extraction and key derivation: The hkdf scheme, CRYPTO, Vol. 6223, Springer, 2010, pp. 631–648.
  • B. LaMacchia, K. Lauter, and A. Mityagin, Stronger security of authenticated key exchange, Provable Security, Springer, 2007, pp. 1–16.
  • J. Li, M.H. Au, W. Susilo, D. Xie, and K. Ren, Attribute-based signature and its applications, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ACM, 2010, pp. 60–69.
  • J. Liu, X. Huang, and J.K. Liu, Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption, Future Generation Computer Systems, Vol. 52, 2015, pp. 67–76. Special Section: Cloud Computing: Security, Privacy and Practice.
  • H.K. Maji, M. Prabhakaran, and M. Rosulek, Attribute-based signatures, Topics in Cryptology–CT-RSA 2011, Springer, 2011, pp. 376–392.
  • Q.M. Malluhi, A. Shikfa, and V.C. Trinh, A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ACM, 2017, pp. 230–240.
  • E. Miles, A. Sahai, and M. Zhandry, Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over ggh13, Annual Cryptology Conference, Springer, 2016, pp. 629–658.
  • V. Odelu, A.K. Das, Y.S. Rao, S. Kumari, M.K. Khan, and K.-K.R. Choo, Pairing-based cp-abe with constant-size ciphertexts and secret keys for cloud environment, Computer Standards & Interfaces 54 (2017), pp. 3–9.
  • T. Okamoto and D. Pointcheval, The gap-problems: A new class of problems for the security of cryptographic schemes, Public Key Cryptography, Springer, 2001, pp. 104–118.
  • T. Okamoto and K. Takashima, Efficient attribute-based signatures for non-monotone predicates in the standard model, Cloud Computing, IEEE Transactions on, Vol. 2, 2014, pp. 409–421.
  • R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security, ACM, 2007, pp. 195–203.
  • T. Pandit, S.K. Pandey, and R Barua, Attribute-based signcryption: Signer privacy, strong unforgeability and ind-cca2 security in adaptive-predicates attack Provable Security, Springer, 2014, pp. 274–290.
  • Y.S. Rao, A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing, Future Generation Computer Systems 67 (2017), pp. 133–151.
  • Y.S Rao, A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing, Future Generation Computer Systems 67 (2017), pp. 133–151.
  • Y.S. Rao and R. Dutta, Efficient attribute-based signature and signcryption realizing expressive access structures, Int. J. Inform. Sec. 15 (2016), pp. 81–109.
  • A. Sahai and B. Waters, Fuzzy identity-based encryption, Advances in Cryptology–EUROCRYPT 2005, Springer, 2005, pp. 457–473.
  • S.F. Shahandashti and R. Safavi-Naini, Threshold attribute-based signatures and their application to anonymous credential systems, Progress in Cryptology–AFRICACRYPT 2009, Springer, 2009, pp. 198–216.
  • R. Steinwandt and A.S. Corona, Attribute-based group key establishment, IACR Cryptology EPrint Archive 2010 (2010), pp. 235.
  • Y. Tian, G. Yang, Y. Mu, K. Liang, and Y. Yu, One-round attribute-based key exchange in the multi-party setting, International Conference on Provable Security, Springer, 2016, pp. 227–243.
  • B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Public Key Cryptography–PKC 2011, Springer, 2011, pp. 53–70.
  • K. Yoneyama, Strongly secure two-pass attribute-based authenticated key exchange, Pairing-Based Cryptography-Pairing 2010, Springer, 2010, pp. 147–166.
  • K. Yoneyama, Two-party round-optimal session-policy attribute-based authenticated key exchange without random oracles, Information Security and Cryptology-ICISC 2011, Springer, 2011, pp. 467–489.
  • H. Zheng, J. Qin, J. Hu, and Q. Wu, Threshold attribute-based signcryption and its application to authenticated key agreement, Security and Communication Networks 9 (2016), pp. 4914–4923.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.