Paper 2010/082

Predicate-Based Key Exchange

James Birkett and Douglas Stebila

Abstract

We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange. We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
predicate-basedattribute-basedkey exchangesecurity modelsprotocols
Contact author(s)
douglas @ stebila ca
History
2010-02-17: last of 2 revisions
2010-02-16: received
See all versions
Short URL
https://ia.cr/2010/082
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/082,
      author = {James Birkett and Douglas Stebila},
      title = {Predicate-Based Key Exchange},
      howpublished = {Cryptology ePrint Archive, Paper 2010/082},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/082}},
      url = {https://eprint.iacr.org/2010/082}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.