Predicate-based key exchange


Autoria(s): Birkett, James; Stebila, Douglas
Contribuinte(s)

Hawkes, Philip

Steinfeld, Ron

Data(s)

21/04/2010

Resumo

We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/31902/

Publicador

Springer

Relação

http://eprints.qut.edu.au/31902/1/c31902.pdf

http://web.science.mq.edu.au/conferences/acisp2010/

Birkett, James & Stebila, Douglas (2010) Predicate-based key exchange. In Hawkes, Philip & Steinfeld, Ron (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.

Direitos

Copyright 2010 Springer

This is the author-version of the work. Conference proceedings published, by Springer Verlag, will be available via Lecture Notes in Computer Science http://www.springer.de/comp/lncs/

Fonte

Information Security Institute

Palavras-Chave #080402 Data Encryption #predicate-based #attribute-based #key exchange #protocols #security models #cryptography
Tipo

Conference Paper