Journal on Communications ›› 2014, Vol. 35 ›› Issue (5): 33-43.doi: 10.3969/j.issn.1000-436x.2014.05.005

• academic paper • Previous Articles     Next Articles

Attribute-based authenticated key agreement protocol supporting revocation

Qiang LI,Deng-guo FENG,Li-wu ZHANG   

  1. TCA, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
  • Online:2014-05-25 Published:2017-07-24
  • Supported by:
    The National Basic Research Program of China (973 Program);The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China

Abstract:

Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed. The protocol based on Waters' ciphertext-policy attribute-based encryption and Boneh-Gentry-Waters' broadcast encryption was constructed. In the protocol, revocation can be done immediately without affecting any non-revoked users and does not require users to update keys periodically by interacting with the key authority. Compared with the existing ABAKA protocols, the protocol is more efficient in communication complexity. The protocol is provably secure in the standard model and modified ABCK model. The pro-tocol can also provide weak perfect forward secrecy and key compromise impersonation resilience.

Key words: authentication, key agreement, attribute-based, key revocation, standard model

No Suggested Reading articles found!