Skip to main content

A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECC

  • 482 Accesses

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 1122)

Abstract

This paper presents a two party attribute based authenticated key agreement protocol without using bilinear pairing. Attribute based key agreement is required in several applications wherever a fine grained access control is required like cloud storage, military applications, broadcast encryption etc. In several applications a secure session between the participants is established without knowing their actual identities. In that case in place of identities a descriptive set of attributes (called as access policy) is used. The participants having sufficient set of attributes that satisfy the access policy are considered as authenticated and eligible for key establishment. The present paper uses Shamir Secret Sharing, Diffie Hellman Key exchange and elliptic curve arithmetic instead of bilinear pairing computations. The participant is authenticated based on the access policy defined over the set of attributes. The participant who satisfies the set of attributes perform Diffie Hellman key exchange with the other participant. Thus, a secure key is established between the participants. The authentication process of this protocol is information theoretically secure while the confidentiality rely on the intractability of Elliptic Curve Discrete Logarithm Problem (ECDLP). abstract environment.

Keywords

  • Attribute Based Encryption
  • ECC
  • Shamir secret sharing scheme
  • Diffie Hellman Key Exchange

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-39875-0_11
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   149.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-39875-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   199.99
Price excludes VAT (USA)

References

  1. Smart, N.P.: Identity-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 38(13), 630–632 (2002)

    CrossRef  Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) Advances in Cryptology—CRYPTO 2001, pp. 213–229. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  3. Shim, K.: Efficient id-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 39(8), 653–654 (2003)

    CrossRef  Google Scholar 

  4. Wang, S., Cao, Z., Choo, K.-K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3), 307–318 (2009)

    MathSciNet  CrossRef  Google Scholar 

  5. Boyd, C., Cliff, Y., Gonzalez, Nieto J., Paterson, K.G.: Efficient one-round key exchange in the standard model. In: Mu, Y., Susilo, W., Seberry, J. (eds.) Information Security and Privacy, pp. 69–83. Springer, Heidelberg (2008)

    CrossRef  Google Scholar 

  6. Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching, January 2007

    Google Scholar 

  7. Sahai, A., Waters, B.: Fuzzy identity-based encryption. Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Google Scholar 

  8. Vipul, G., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM, New York (2006)

    Google Scholar 

  9. Wang, H., Xu, Q., Fu, X.: Two-party attribute-based key agreement protocol in the standard model

    Google Scholar 

  10. Wang, H., Xu, Q., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1042–1045, September 2009

    Google Scholar 

  11. Gorantla, M.C., Boyd, C., González Nieto, J.M.: Attribute-based authenticated key exchange. In: Steinfeld, R., Hawkes, P. (eds.) Information Security and Privacy, pp. 300–317. Springer, Heidelberg (2010)

    CrossRef  Google Scholar 

  12. Steinwandt, R., Corona, A.: Attribute-based group key establishment. IACR Cryptology ePrint Archive 2010:235, August 2010

    Google Scholar 

  13. Li, J., Yao, W., Zhang, Y., Qian, H., Han, J.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2017)

    CrossRef  Google Scholar 

  14. Han, J., Susilo, W., Mu, Y., Zhou, J., Au, M.H.A.: Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(3), 665–678 (2015)

    CrossRef  Google Scholar 

  15. Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14(6), 487–497 (2015)

    CrossRef  Google Scholar 

  16. Hu, S., Li, J., Zhang, Y.: Two-party attribute-based key agreement protocol with constant-size ciphertext and key. Secur. Commun. Netw.

    Google Scholar 

  17. Bertino, E., Nabeel, M.: Poster: towards attribute based group key management, pp. 821–824 (2011)

    Google Scholar 

  18. Tate, J.T.: The arithmetic of elliptic curves. Inventiones Math. 23(3), 179–206 (1974)

    MathSciNet  CrossRef  Google Scholar 

  19. Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. IACR Cryptology ePrint Archive, 2013:734 (2013)

    Google Scholar 

  20. Li, N.: Research on Diffie-Hellman key exchange protocol. In: 2010 2nd International Conference on Computer Engineering and Technology, vol. 4, pp. V4-634–V4-637, April 2010

    Google Scholar 

  21. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    MathSciNet  CrossRef  Google Scholar 

  22. Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 59(6), 842–846 (2010)

    MathSciNet  CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reshu Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Verma, R., Kumar, A. (2020). A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECC. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham. https://doi.org/10.1007/978-3-030-39875-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-39875-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39874-3

  • Online ISBN: 978-3-030-39875-0

  • eBook Packages: EngineeringEngineering (R0)