Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Attribute-based non-interactive key exchange




(1) 形式化定义了基于属性的非交互式密钥交换协议并给出了相应的安全模型; (2) 基于非一致输入混淆器 (differing-input obfuscation, diO) 构造了一个具体的基于属性的非交互式密钥交换协议并证明其安全性; (3) 证明了基于属性的非交互式密钥交换协议这一概念蕴含了基于身份的非交互式密钥交换协议与多方基于属性的密钥交换协议。

This is a preview of subscription content, log in to check access.


  1. 1

    Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, 22: 644–654

  2. 2

    Freire E S V, Hofheinz D, Kiltz E, et al. Noninteractive key exchange. In: Public-Key Cryptography — PKC 2013. Berlin: Springer, 2013. 254–271

  3. 3

    Boneh D, Zhandry M. Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Advances in Cryptology — CRYPTO 2014. Berlin: Springer, 2014. 480–499

  4. 4

    Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proceedings of the Symposium on Cryptography and Information Security, Okinawa, 2000. 135–148

  5. 5

    Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, 2006. 89–98

  6. 6

    Ananth P, Boneh D, Garg S, et al. Deffering-inputs obfuscation and applications. Cryptology ePrint Archive, Report 2013/689. 2013

  7. 7

    Boyle E, Chung K M, Pass R. On extractability obfuscation. In: Theory of Cryptography. Berlin: Springer, 2014. 52–73

  8. 8

    Sahai A, Waters B. How to use indistinguishability obfuscation: deniable encryption, and more. In: Proceedings of the 46th Annual Symposium on Theory of Computing (STOC 2014). New York: ACM, 2014. 475–484

  9. 9

    Goldwasser S, Micali S, Rivest R L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput, 1988, 17: 281–308

Download references

Author information

Correspondence to Fei Tang or Rui Zhang or Hongda Li.

Additional information

The authors declare that they have no conflict of interest.

Electronic supplementary material

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Tang, F., Zhang, R. & Li, H. Attribute-based non-interactive key exchange. Sci. China Inf. Sci. 60, 19101 (2017).

Download citation


  • 非交互式密钥交换
  • 基于属性的密码学
  • 程序混淆
  • 穿刺程序
  • 可证明安全