Abstract | ||
---|---|---|
We provide the first eCK security model for predicate-based authenticated key exchange (AKE) to guarantee resistance to leakage of ephemeral secret keys. We also propose an two-pass attribute-based AKE protocol secure in the proposed predicate-based eCK security model based on a attribute-based encryption. The proposed protocol has advantages in security against leakage of ephemeral secret keys and the round complexity compared to the previous predicate-based AKE protocol. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-17955-6_2 | WISA |
Keywords | Field | DocType |
ephemeral secret key,key leakage,proposed protocol,ake protocol,predicate-based authenticated key exchange,attribute-based encryption,previous predicate-based ake protocol,proposed predicate-based eck security,round complexity,eck security model,security model,attribute based encryption | Round complexity,Leakage (electronics),Computer science,Computer security,Authenticated Key Exchange,Encryption,Predicate (grammar),Ephemeral key,Computer security model | Conference |
Volume | ISSN | ISBN |
6513 | 0302-9743 | 3-642-17954-1 |
Citations | PageRank | References |
4 | 0.44 | 15 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Atsushi Fujioka | 1 | 602 | 42.75 |
Koutarou Suzuki | 2 | 518 | 29.57 |
kazuki | 3 | 67 | 10.08 |