Abstract
In this paper, we present a two-party attribute-based key agreement protocol, which is secure in the standard model (without random oracle s ), under the truncated decision q-ABDHE assumption. Then we give a modified version of this scheme, in which the users can be revoked efficiently. The attribute-based key agreement protocol is based on the attribute-based encryption scheme, which is a generalization of identity-based cryptosystems, incorporates attributes as inputs to its cryptographic primitives. These kinds of schemes not only preserve the advantages of traditional identity-based key agreement protocol, but also provide some new properties, such as hiding the identity information of the individual, increasing the flexibility of key management, and providing efficient means to revoke users from the system.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have