Cryptology ePrint Archive: Report 2010/082
Predicate-Based Key Exchange
James Birkett and Douglas Stebila
Abstract: We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.
We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.
Category / Keywords: cryptographic protocols / predicate-based, attribute-based, key exchange, security models, protocols
Date: received 15 Feb 2010, last revised 16 Feb 2010
Contact author: douglas at stebila ca
Available format(s): PDF | BibTeX Citation
Version: 20100217:010828 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]