Skip to main content

2020 | OriginalPaper | Buchkapitel

Design of Attribute Based Authenticated Group Key Agreement Protocol Without Pairing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper present a multi-party attribute based authenticated key agreement protocol without using bilinear pairing. Attribute based key agreement is needed in verity of applications wherever a fine grained access control is required like design of access control for cloud storage, military applications, broadcast encryption etc. Such applications usually need to establish, a secure session among the participants without knowing their actual identities for subsequent cryptographic (symmetric key) operations. Instead of identities, the participants are authenticates based on a descriptive set of attributes (called as access policy). As per the literature-survey the protocols based on attribute based authentication presented so far requires bilinear pairing computations. Since the implementation of pairing is much costlier than ordinary scalar point multiplication over elliptic curve. Therefore pairing free protocols over attribute-based authentication is much desirable especially in resource constraint network. The present paper employs elliptic curve arithmetic along with Lagrange interpolation instead of bilinear pairing computations. The authentication process of the protocol is information theoretically secure while the confidentiality of the shared key relies on the intractability of Elliptic Curve Discrete Logarithm Problem (ECDLP).

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Smart, N.P.: Identity-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 38(13), 630–632 (2002)CrossRef Smart, N.P.: Identity-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 38(13), 630–632 (2002)CrossRef
2.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (eds.) Advances in Cryptology—CRYPTO 2001, pp. 213–229. Springer, Berlin, Heidelberg (2001)CrossRef Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (eds.) Advances in Cryptology—CRYPTO 2001, pp. 213–229. Springer, Berlin, Heidelberg (2001)CrossRef
3.
Zurück zum Zitat Shim, K.: Efficient id-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 39(8), 653–654 (2003)CrossRef Shim, K.: Efficient id-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 39(8), 653–654 (2003)CrossRef
4.
Zurück zum Zitat Wang, S., Cao, Z., Choo, K.-K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3), 307–318 (2009)MathSciNetCrossRef Wang, S., Cao, Z., Choo, K.-K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3), 307–318 (2009)MathSciNetCrossRef
5.
Zurück zum Zitat Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching, January 2007 Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching, January 2007
6.
Zurück zum Zitat Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457–473. Springer, Heidelberg (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
7.
Zurück zum Zitat Vipul, G., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM, New York (2006) Vipul, G., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM, New York (2006)
8.
Zurück zum Zitat Wang, H., Xu, Q., Fu, X.: Two-party attribute-based key agreement protocol in the standard model Wang, H., Xu, Q., Fu, X.: Two-party attribute-based key agreement protocol in the standard model
9.
Zurück zum Zitat Wang, H., Xu, Q., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1042–1045, September 2009 Wang, H., Xu, Q., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1042–1045, September 2009
10.
Zurück zum Zitat Gorantla, M.C., Boyd, C., González Nieto, J.M.: Attribute-based authenticated key exchange. In: Steinfeld, R., Hawkes, P. (eds.) Information Security and Privacy, pp. 300–317. Springer, Heidelberg (2010)CrossRef Gorantla, M.C., Boyd, C., González Nieto, J.M.: Attribute-based authenticated key exchange. In: Steinfeld, R., Hawkes, P. (eds.) Information Security and Privacy, pp. 300–317. Springer, Heidelberg (2010)CrossRef
11.
Zurück zum Zitat Steinwandt, R., Corona, A.: Attribute-based group key establishment. IACR Cryptology ePrint Archive 2010:235, August 2010 Steinwandt, R., Corona, A.: Attribute-based group key establishment. IACR Cryptology ePrint Archive 2010:235, August 2010
12.
Zurück zum Zitat Li, J., Yao, W., Zhang, Y., Qian, H., Han, J.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2017)CrossRef Li, J., Yao, W., Zhang, Y., Qian, H., Han, J.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2017)CrossRef
13.
Zurück zum Zitat Han, J., Susilo, W., Mu, Y., Zhou, J., Au, M.H.A.: Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(3), 665–678 (2015)CrossRef Han, J., Susilo, W., Mu, Y., Zhou, J., Au, M.H.A.: Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(3), 665–678 (2015)CrossRef
14.
Zurück zum Zitat Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14(6), 487–497 (2015)CrossRef Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14(6), 487–497 (2015)CrossRef
15.
Zurück zum Zitat Cheung, L., Cooley, J.A., Khazan, R.I., Newport, C.C.: Collusion-resistant group key management using attribute-based encryption. IACR Cryptology ePrint Archive 2007:161 (2007) Cheung, L., Cooley, J.A., Khazan, R.I., Newport, C.C.: Collusion-resistant group key management using attribute-based encryption. IACR Cryptology ePrint Archive 2007:161 (2007)
16.
Zurück zum Zitat Bertino, E., Nabeel, M.: Poster: towards attribute based group key management, pp. 821–824 (2011) Bertino, E., Nabeel, M.: Poster: towards attribute based group key management, pp. 821–824 (2011)
17.
Zurück zum Zitat Kumar, A.: Ternary tree based group key agreement protocol over elliptic curve for dynamic group (2014)CrossRef Kumar, A.: Ternary tree based group key agreement protocol over elliptic curve for dynamic group (2014)CrossRef
19.
Zurück zum Zitat Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. IACR Cryptology ePrint Archive, 2013:734 (2013) Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. IACR Cryptology ePrint Archive, 2013:734 (2013)
21.
Zurück zum Zitat Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 59(6), 842–846 (2010)MathSciNetCrossRef Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 59(6), 842–846 (2010)MathSciNetCrossRef
22.
Zurück zum Zitat Hu, S., Li, J., Zhang, Y.: Two-party attribute-based key agreement protocol with constant-size ciphertext and key. Secur. Commun. Netw., (2018) Hu, S., Li, J., Zhang, Y.: Two-party attribute-based key agreement protocol with constant-size ciphertext and key. Secur. Commun. Netw., (2018)
23.
Zurück zum Zitat Tian, Y., Yang, G., Mu, Y., Liang, K., Yu, Y.: One-round attribute-based key exchange in the multi-party setting. In: Chen, L., Han, J. (eds.) Provable Security, pp. 227–243. Springer, Cham (2016) Tian, Y., Yang, G., Mu, Y., Liang, K., Yu, Y.: One-round attribute-based key exchange in the multi-party setting. In: Chen, L., Han, J. (eds.) Provable Security, pp. 227–243. Springer, Cham (2016)
Metadaten
Titel
Design of Attribute Based Authenticated Group Key Agreement Protocol Without Pairing
verfasst von
Reshu Verma
Abhimanyu Kumar
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_10