Advantage Of Key Agreement Protocol

The KA (Key Agreement) protocol is used to establish secure communication between two or more parties and authenticate entities in an open environment. With the advent of identity cryptography, Smart [6] introduced the first bipartisan identity-based key memorandum of understanding (ID-KA) that accepted the IBE scheme [7]. Since then, many IDENTIFICATION-KA protocols have been presented successively [1, 8-11]. These IDENTIFICATION-KA protocols have been demonstrated as being safe in different models such as the BJM [12], br4, CK, etc. Huang and Cao [13] provided the first detectable IDENTIFICATION-AK protocol in the eCK model [14]. Based on the BJM [12] model, Chen et al. [9] proposed the ID-BJM model and built key agreement protocols based on identity. In order to implement detailed access control, session keys are negotiated on the basis of mutual authentication of participant attribute information. many attribute-based Key Agreement (AB-KA) protocols [15-20] are presented. In AB-KA protocols, attribute-based encryption (ABE) plays an important role in protecting secret messages used to generate session keys.

ABE [21] was divided mainly into two categories called ABE (CP-ABE) and key-policy ABE (KP-ABE) breakage codes. In CP-ABE, the data owner selects an access structure for attributes and encrypts the data with the corresponding attribute of the public key. The access structure is integrated into the encryption text, while the secret key is created based on the data user`s attribute. If a user`s attributes fill the access structure built into the text, he decrypts that encryption text [22]. The KP-ABE scheme is reversed. The encryptor selects descriptive attributes to encrypt the data. Recently, Li et al. [23, 24] presented two CP-ABE schemes with an effective waiver of the attribute that opposes the attack on Dieskokunden`s customers and supports fine grain access control.

There are a few decentralized CP-ABE schemes that protect privacy, in which the size of the encryption text increases linearly with the number of attributes built into the access policy. To improve efficiency, Emura et al. [28] presented a CP-ABE scheme with a constant encryption size. Many EBA schemes [29-38] have been used in different areas of application, such as the EBA, with outsourced data encryption [29, 30, 37], ABE with effective attribute locking [31], fully verifiable EBA [30], ABE with keyword search function [29, 31], abeable abeable ABE [32, 33], ABE with leak resistance [34-36], ABE [38], verifiable, etc. To solve the important trust problem, Li et al. [39, 40] presented two certificate-based encryption schemes with default security.

Artículos Relacionados