Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu
{"title":"A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks","authors":"Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.224","DOIUrl":null,"url":null,"abstract":"We present the first selectively secure hierarchical identity-based non-interactive key agreement (HIB-NIKA) in the standard model that does not explicitly require multilinear maps. We give a novel solution for resilience called \"shadowing factor\" to improve the security of HIB-NIKA and present a practical attack model of hierarchical key agreement to analyze the anti-forgery and anti-collusion properties of key agreements in the real situation. Through the theoretical proof and practical analysis, our HIB-NIKA has been proved anti-collusion and resilient against the compromises from intermediate and leaf nodes in the hierarchy, which covers the shortage of the trial of Guo and solves the open problem posed by Gennaro in-the-true-sense.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Trustcom/BigDataSE/ICESS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We present the first selectively secure hierarchical identity-based non-interactive key agreement (HIB-NIKA) in the standard model that does not explicitly require multilinear maps. We give a novel solution for resilience called "shadowing factor" to improve the security of HIB-NIKA and present a practical attack model of hierarchical key agreement to analyze the anti-forgery and anti-collusion properties of key agreements in the real situation. Through the theoretical proof and practical analysis, our HIB-NIKA has been proved anti-collusion and resilient against the compromises from intermediate and leaf nodes in the hierarchy, which covers the shortage of the trial of Guo and solves the open problem posed by Gennaro in-the-true-sense.