Font Size: a A A

Research On Attribute-Based Key Agreement Protocol

Posted on:2015-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y J DuFull Text:PDF
GTID:2298330467974549Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Key agreement protocol plays a fundamental role in the field of secure communication. Ingeneral, attribute-based authenticated key agreement protocol can negotiate a shared session keyafter the mutual authentication in the insecure communication between two users. The session keycan provide security services for the subsequent communication such as confidentiality, certificationand integrity.Based on further study on the attribute-based encryptions (ABE) and key agreement protocols,two encryption algorithms are firstly proposed: one is ciphertext-policy ABE while the other iskey-policy ABE, both of which can achieve the key encapsulation and decapsulation. On this basis,combined with Diffie-Hellman key exchange idea, two efficient key agreement protocols areproposed: session-policy attribute-based authenticated key agreement protocol (SP-ABAKA) andkey-policy attribute-based authenticated key agreement protocol (KP-ABAKA). In SP-ABAKA, theaccess control structure uses the linear secret sharing scheme which keeps the access policy flexible.More importantly, the algorithm only contains three bilinear pairings that significantly improvesoperational efficiency. In KP-ABAKA, the access control structure uses the unanimous consentcontrol by modular addition scheme that replaces the Lagrange Interpolation for the “AND” as wellas “OR” policy, which greatly improves the operational efficiency of the algorithm. What’s more,using the NAXOS technique proposed by LaMacchia in which the static key and the ephemeral keyboth act as the input of hash function and the hash value acts as an exponent of the key agreementprocedure, the SP-ABAKA and KP-ABAKA achieve provable security in the ABeCK model.This thesis not only gives specific implementations and security proof of the SP-ABAKA andKP-ABAKA, but also carries out a detailed theoretical analysis and simulation experiments. Theresults show that compared with other key agreement protocols, the SP-ABAKA and KP-ABAKAproposed above achieve higher computational efficiency with the similar level in data traffic andsecurity.
Keywords/Search Tags:key agreement, session-policy, key-policy, NAXOS technique, access control structure
PDF Full Text Request
Related items