Skip to main content
Log in

Attribute-based non-interactive key exchange

基于属性的非交互式密钥交换

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

摘要

创新点

(1) 形式化定义了基于属性的非交互式密钥交换协议并给出了相应的安全模型; (2) 基于非一致输入混淆器 (differing-input obfuscation, diO) 构造了一个具体的基于属性的非交互式密钥交换协议并证明其安全性; (3) 证明了基于属性的非交互式密钥交换协议这一概念蕴含了基于身份的非交互式密钥交换协议与多方基于属性的密钥交换协议。

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, 22: 644–654

    Article  MathSciNet  MATH  Google Scholar 

  2. Freire E S V, Hofheinz D, Kiltz E, et al. Noninteractive key exchange. In: Public-Key Cryptography — PKC 2013. Berlin: Springer, 2013. 254–271

    Chapter  Google Scholar 

  3. Boneh D, Zhandry M. Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Advances in Cryptology — CRYPTO 2014. Berlin: Springer, 2014. 480–499

    Chapter  Google Scholar 

  4. Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proceedings of the Symposium on Cryptography and Information Security, Okinawa, 2000. 135–148

    Google Scholar 

  5. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, 2006. 89–98

    Google Scholar 

  6. Ananth P, Boneh D, Garg S, et al. Deffering-inputs obfuscation and applications. Cryptology ePrint Archive, Report 2013/689. http://eprint.iacr.org/. 2013

    Google Scholar 

  7. Boyle E, Chung K M, Pass R. On extractability obfuscation. In: Theory of Cryptography. Berlin: Springer, 2014. 52–73

    Chapter  Google Scholar 

  8. Sahai A, Waters B. How to use indistinguishability obfuscation: deniable encryption, and more. In: Proceedings of the 46th Annual Symposium on Theory of Computing (STOC 2014). New York: ACM, 2014. 475–484

    Google Scholar 

  9. Goldwasser S, Micali S, Rivest R L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput, 1988, 17: 281–308

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Fei Tang, Rui Zhang or Hongda Li.

Additional information

The authors declare that they have no conflict of interest.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tang, F., Zhang, R. & Li, H. Attribute-based non-interactive key exchange. Sci. China Inf. Sci. 60, 19101 (2017). https://doi.org/10.1007/s11432-015-0994-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-015-0994-0

关键词

Navigation