Title | ||
---|---|---|
Strongly Secure Predicate-Based Authenticated Key Exchange: Definition And Constructions |
Abstract | ||
---|---|---|
This paper firstly provides the extended Canetti-Krawzcyk (eCK) security model for predicate-based authenticated key exchange (AKE) that guarantees resistance to leakage of ephemeral secret keys. Moreover, we propose two-pass key-policy (resp. session-policy) attribute-based AKE protocol secure in the proposed predicate-based eCK security model based on key-policy (resp. ciphertext-policy) attribute-based encryption. The proposed protocols have advantages in security against leakage of ephemeral secret keys and the round complexity compared to the previous predicate-based AKE protocols. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1587/transfun.E95.A.40 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES |
Keywords | Field | DocType |
predicate-based AKE, eCK security, key-policy, session-policy | Round complexity,Computer science,Computer security,Authenticated Key Exchange,Theoretical computer science,Encryption,Predicate (grammar),Ephemeral key,Key policy,Computer security model | Journal |
Volume | Issue | ISSN |
E95A | 1 | 0916-8508 |
Citations | PageRank | References |
3 | 0.40 | 8 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Atsushi Fujioka | 1 | 602 | 42.75 |
Koutarou Suzuki | 2 | 518 | 29.57 |
Kazuki Yoneyama | 3 | 31 | 5.56 |