Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2023

22-05-2023

An innovative key agreement protocol with complex attribute authentication based on blockchain

Authors: Shengzhou Hu, Wenhao Li, Tingting Zhong, Hua He

Published in: Peer-to-Peer Networking and Applications | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In cloud environment, attribute-based key agreement (AB-KA) protocol can be applied in the practical scenario of achieving session key by mutual attribute authentication. The adopted attribute-based encryption (ABE) technology for attribute authentication in the traditional AB-KA protocols only depict the simple operation of attributes, such as AND, OR, Threshold, etc. The traditional ABE access structures, just like polynomial function, Linear Secret Sharing Scheme (LSSS), AND-gate etc., hardly depict the complex attribute relationships. Hence, the existing protocols based on such ABE schemes cannot depict the entities’ authentication of complex attribute relations, such as that the average value of 30 attributes is greater than or equal to 80. For solving the problem, we introduce the technology of attribute predicate (AP) for enhancing the entity authentication function. AP constructs the comprehensive attribute calculation with various operations, such as arithmetic operations, relational operations, string operations, etc. Besides, there is another problem, that is, the power of attribute authority (AA) in traditional AB-KA protocol is highly concentrated, which easily suffers from single point failure or privacy leakage. Blockchain has the advantages of decentralization, anti-tamper, traceability and distributed database. To effectively prevent the security problems in the single centralized authorization mode and avoid the corresponding performance bottleneck, we tried to apply consortium blockchain (CB) to construct AB-KA protocol. A two-party key agreement protocol with and-gate attribute-predicate encryption on blockchain (AG-APE-BC-KA) was proposed in the paper. Attribute-based access control processes can be traced by recording and viewing the access authorization and access processes via the CB technology. The proposed scheme adopted AP to depict more general and flexible attribute relationship for generating the session key of communication users. It also enhanced the tracking of AA’s authority and data security on cloud storage. Under the decision q-parallel bilinear Diffie-Hellman exponent (q-PBDHE) hypothesis, the protocol is securely proved to be true under the attribute-based BJM (Black-Johnson-Menezes) model. The protocol with CB has high efficiency and better security. In particular, it completely satisfies many scenarios needing the complex attribute authentication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Matsumoto T, Takashima Y, Imai H (1986) On seeking smart public-key-distribution systems. IEICE Trans 69:99–106 Matsumoto T, Takashima Y, Imai H (1986) On seeking smart public-key-distribution systems. IEICE Trans 69:99–106
2.
go back to reference Law L, Menezes A, Qu M et al (2003) An efficient protocol for authenticated key agreement. Des Codes Cryptogr 28:119–134 Law L, Menezes A, Qu M et al (2003) An efficient protocol for authenticated key agreement. Des Codes Cryptogr 28:119–134
4.
go back to reference Smart NP (2002) Identity-based authenticated key agreement protocol based on Weil pairing. Electron Lett 38:630–632CrossRefMATH Smart NP (2002) Identity-based authenticated key agreement protocol based on Weil pairing. Electron Lett 38:630–632CrossRefMATH
5.
go back to reference Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, pp 213–229 Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, pp 213–229
6.
go back to reference Boyd C, Cliff Y, Gonzalez Nieto J, Paterson KG (2008) Efficient one-round key exchange in the standard model. In: Australasian Conference on Information Security and Privacy. Springer, pp 69–83 Boyd C, Cliff Y, Gonzalez Nieto J, Paterson KG (2008) Efficient one-round key exchange in the standard model. In: Australasian Conference on Information Security and Privacy. Springer, pp 69–83
7.
go back to reference Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: IMA international conference on cryptography and coding. Springer, pp 30–45 Blake-Wilson S, Johnson D, Menezes A (1997) Key agreement protocols and their security analysis. In: IMA international conference on cryptography and coding. Springer, pp 30–45
8.
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 457–473
9.
go back to reference Eslami Z, Pakniat N, Noroozi M (2014) Cryptanalysis of an attribute-based key agreement protocol. Int J Comput Inf Technol 2:351–358 Eslami Z, Pakniat N, Noroozi M (2014) Cryptanalysis of an attribute-based key agreement protocol. Int J Comput Inf Technol 2:351–358
10.
go back to reference Wei J, Liu W, Hu X (2014) Provable secure attribute based authenticated key exchange protocols in the standard model. J Softw 25:2397–2408MathSciNet Wei J, Liu W, Hu X (2014) Provable secure attribute based authenticated key exchange protocols in the standard model. J Softw 25:2397–2408MathSciNet
11.
go back to reference Bayat M, Aref M (2015) An attribute based key agreement protocol resilient to KCI attack. Int J Electron Inf Eng 2:10–20 Bayat M, Aref M (2015) An attribute based key agreement protocol resilient to KCI attack. Int J Electron Inf Eng 2:10–20
12.
go back to reference Qikun Z, Yongjiao L, Yong G et al (2019) Group key agreement protocol based on privacy protection and attribute authentication. IEEE Access 7:87085–87096CrossRef Qikun Z, Yongjiao L, Yong G et al (2019) Group key agreement protocol based on privacy protection and attribute authentication. IEEE Access 7:87085–87096CrossRef
13.
go back to reference Verma R, Kumar A (2019) Design of Attribute Based Authenticated Group Key Agreement Protocol Without Pairing. In: International Conference on Internet of Things and Connected Technologies. Springer, pp 95–104 Verma R, Kumar A (2019) Design of Attribute Based Authenticated Group Key Agreement Protocol Without Pairing. In: International Conference on Internet of Things and Connected Technologies. Springer, pp 95–104
14.
go back to reference Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. pp 89–98
15.
go back to reference Yu G, Zha X, Wang X et al (2020) Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE Trans Eng Manag 67:1213–1230CrossRef Yu G, Zha X, Wang X et al (2020) Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE Trans Eng Manag 67:1213–1230CrossRef
16.
go back to reference Yang X, Li T, Pei X et al (2020) Medical data sharing scheme based on attribute cryptosystem and blockchain technology. IEEE Access 8:45468–45476CrossRef Yang X, Li T, Pei X et al (2020) Medical data sharing scheme based on attribute cryptosystem and blockchain technology. IEEE Access 8:45468–45476CrossRef
17.
go back to reference Niu SF, Liu WK, Chen LX et al (2020) Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain. J Commun 41:204–214 Niu SF, Liu WK, Chen LX et al (2020) Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain. J Commun 41:204–214
18.
go back to reference Zhang A, Lin X (2018) Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J Med Syst 42:1–18CrossRef Zhang A, Lin X (2018) Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J Med Syst 42:1–18CrossRef
20.
go back to reference Wu A, Zhang Y, Zheng X et al (2019) Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann Telecommun 74:401–411CrossRef Wu A, Zhang Y, Zheng X et al (2019) Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann Telecommun 74:401–411CrossRef
22.
go back to reference Guo F, Mu Y, Susilo W et al (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf forensics Secur 9:763–771CrossRef Guo F, Mu Y, Susilo W et al (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf forensics Secur 9:763–771CrossRef
23.
go back to reference Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987). IEEE, pp 427–438 Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987). IEEE, pp 427–438
24.
go back to reference Xue K, Hong J, Xue Y et al (2017) CABE: A new comparable attribute-based encryption construction with 0-encoding and 1-encoding. IEEE Trans Comput 66:1491–1503MathSciNetCrossRefMATH Xue K, Hong J, Xue Y et al (2017) CABE: A new comparable attribute-based encryption construction with 0-encoding and 1-encoding. IEEE Trans Comput 66:1491–1503MathSciNetCrossRefMATH
25.
go back to reference Khan F, Li H, Zhang Y et al (2021) Efficient attribute-based encryption with repeated attributes optimization. Int J Inf Secur 20:431–444CrossRef Khan F, Li H, Zhang Y et al (2021) Efficient attribute-based encryption with repeated attributes optimization. Int J Inf Secur 20:431–444CrossRef
26.
go back to reference Khan F, Khan S, Tahir S et al (2021) Granular data access control with a patient-centric policy update for healthcare. Sensors 21:3556CrossRef Khan F, Khan S, Tahir S et al (2021) Granular data access control with a patient-centric policy update for healthcare. Sensors 21:3556CrossRef
27.
go back to reference Liu Z, Cao Z, Wong DS (2010) Efficient generation of linear secret sharing scheme matrices from threshold access trees. Cryptol ePrint Arch Liu Z, Cao Z, Wong DS (2010) Efficient generation of linear secret sharing scheme matrices from threshold access trees. Cryptol ePrint Arch
29.
go back to reference Weber SG (2013) Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes. Cryptol ePrint Arch Weber SG (2013) Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes. Cryptol ePrint Arch
31.
go back to reference Ateniese G, Kirsch J, Blanton M (2007) Secret handshakes with dynamic and fuzzy matching. In: Arbaugh W, ed. Proc. of the NDSS 2007. 159–177 Ateniese G, Kirsch J, Blanton M (2007) Secret handshakes with dynamic and fuzzy matching. In: Arbaugh W, ed. Proc. of the NDSS 2007. 159–177
32.
go back to reference Li J, Hu S, Zhang Y (2018) Two-party attribute-based key agreement protocol with constant-size ciphertext and key. Secur Commun Networks:2018 Li J, Hu S, Zhang Y (2018) Two-party attribute-based key agreement protocol with constant-size ciphertext and key. Secur Commun Networks:2018
33.
go back to reference Yoneyama K (2010) Strongly secure two-pass attribute-based authenticated key exchange. In: International Conference on Pairing-Based Cryptography. Springer, pp 147–166. ISBN:978-3-642-17454-4 Yoneyama K (2010) Strongly secure two-pass attribute-based authenticated key exchange. In: International Conference on Pairing-Based Cryptography. Springer, pp 147–166. ISBN:978-3-642-17454-4
34.
go back to reference Chakraborty S, Rao SY, Pandu Rangan C (2021) Efficient single round attribute-based authenticated key exchange protocol. Int J Comput Math Comput Syst Theory 6:313–336MathSciNetCrossRef Chakraborty S, Rao SY, Pandu Rangan C (2021) Efficient single round attribute-based authenticated key exchange protocol. Int J Comput Math Comput Syst Theory 6:313–336MathSciNetCrossRef
35.
go back to reference Verma R, Kumar A (2019) A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECC. In: International Conference on Internet of Things and Connected Technologies. Springer, pp 105–114 Verma R, Kumar A (2019) A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECC. In: International Conference on Internet of Things and Connected Technologies. Springer, pp 105–114
36.
go back to reference Öztürk G (2020) Identity/attribute-based authentication protocols based on pairings Öztürk G (2020) Identity/attribute-based authentication protocols based on pairings
39.
go back to reference Zhang Y, Li B, Liu B et al (2020) An attribute-based collaborative access control scheme using blockchain for IoT devices. Electronics 9:285CrossRef Zhang Y, Li B, Liu B et al (2020) An attribute-based collaborative access control scheme using blockchain for IoT devices. Electronics 9:285CrossRef
40.
go back to reference Ezhil Arasi V, Indra Gandhi K, Kulothungan K (2022) Auditable attribute-based data access control using blockchain in cloud storage. J Supercomput 78:10772–10798CrossRef Ezhil Arasi V, Indra Gandhi K, Kulothungan K (2022) Auditable attribute-based data access control using blockchain in cloud storage. J Supercomput 78:10772–10798CrossRef
41.
go back to reference Qin X, Huang Y, Yang Z, Li X (2021) A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J Syst Archit 112:101854CrossRef Qin X, Huang Y, Yang Z, Li X (2021) A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J Syst Archit 112:101854CrossRef
42.
go back to reference Liu C, Xiang F, Sun Z (2022) Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain. Secur Commun Networks:2022 Liu C, Xiang F, Sun Z (2022) Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain. Secur Commun Networks:2022
44.
go back to reference Li G, Chen W, Zhang B, Lu S (2021) A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks. J Parallel Distrib Comput 157:157–167CrossRef Li G, Chen W, Zhang B, Lu S (2021) A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks. J Parallel Distrib Comput 157:157–167CrossRef
45.
go back to reference Sultana T, Almogren A, Akbar M et al (2020) Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Appl Sci 10:488CrossRef Sultana T, Almogren A, Akbar M et al (2020) Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Appl Sci 10:488CrossRef
46.
go back to reference Zhang Q, Gan Y, Liu L et al (2018) An authenticated asymmetric group key agreement based on attribute encryption. J Netw Comput Appl 123:1–10CrossRef Zhang Q, Gan Y, Liu L et al (2018) An authenticated asymmetric group key agreement based on attribute encryption. J Netw Comput Appl 123:1–10CrossRef
47.
go back to reference Gan Y, Wang B, Zhuang Y et al (2021) An asymmetric group key agreement protocol based on attribute threshold for Internet of Things. Trans Emerg Telecommun Technol 32:e4179 Gan Y, Wang B, Zhuang Y et al (2021) An asymmetric group key agreement protocol based on attribute threshold for Internet of Things. Trans Emerg Telecommun Technol 32:e4179
48.
go back to reference Beimel A (1996) Secure schemes for secret sharing and key distribution Beimel A (1996) Secure schemes for secret sharing and key distribution
50.
go back to reference Ongaro D, Ousterhout J (2014) In search of an understandable consensus algorithm. In: 2014 USENIX Annual Technical Conference (Usenix ATC 14). pp 305–319 Ongaro D, Ousterhout J (2014) In search of an understandable consensus algorithm. In: 2014 USENIX Annual Technical Conference (Usenix ATC 14). pp 305–319
Metadata
Title
An innovative key agreement protocol with complex attribute authentication based on blockchain
Authors
Shengzhou Hu
Wenhao Li
Tingting Zhong
Hua He
Publication date
22-05-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01450-8

Other articles of this Issue 3/2023

Peer-to-Peer Networking and Applications 3/2023 Go to the issue

Premium Partner