Predicate-based key exchange
Contribuinte(s) |
Hawkes, Philip Steinfeld, Ron |
---|---|
Data(s) |
21/04/2010
|
Resumo |
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer |
Relação |
http://eprints.qut.edu.au/31902/1/c31902.pdf http://web.science.mq.edu.au/conferences/acisp2010/ Birkett, James & Stebila, Douglas (2010) Predicate-based key exchange. In Hawkes, Philip & Steinfeld, Ron (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney. |
Direitos |
Copyright 2010 Springer This is the author-version of the work. Conference proceedings published, by Springer Verlag, will be available via Lecture Notes in Computer Science http://www.springer.de/comp/lncs/ |
Fonte |
Information Security Institute |
Palavras-Chave | #080402 Data Encryption #predicate-based #attribute-based #key exchange #protocols #security models #cryptography |
Tipo |
Conference Paper |