Journal on Communications ›› 2012, Vol. 33 ›› Issue (Z1): 41-47.doi: 10.3969/j.issn.1000-436x.2012.z1.006

• Papers • Previous Articles     Next Articles

Predicate-based authenticated key exchange protocol with attribute-hiding

Wen-fen LIU,Jiang-hong WEI,Xue-xian HU   

  1. PLA Information Engineering University,Zhengzhou 450002,China
  • Online:2012-09-25 Published:2017-08-03
  • Supported by:
    The National Basic Research Program of China(973 Program);The National Basic Research Program of China(973 Program)

Abstract:

To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with NAXOS technique.The security of the new protocol could be reduced to GBDH assumption in the modified eCK model.At the same time,for inheriting the security property of attribute-hiding from the inner product encryption scheme,the proposed protocol guarded against disclosure of users’ sensitive information.

Key words: key exchange protocol, predicate authentication, attribute-hiding, eCK model

No Suggested Reading articles found!