Design of Attribute Based Authenticated Group Key Agreement Protocol Without Pairing

  • Reshu VermaEmail author
  • Abhimanyu Kumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1122)


The paper present a multi-party attribute based authenticated key agreement protocol without using bilinear pairing. Attribute based key agreement is needed in verity of applications wherever a fine grained access control is required like design of access control for cloud storage, military applications, broadcast encryption etc. Such applications usually need to establish, a secure session among the participants without knowing their actual identities for subsequent cryptographic (symmetric key) operations. Instead of identities, the participants are authenticates based on a descriptive set of attributes (called as access policy). As per the literature-survey the protocols based on attribute based authentication presented so far requires bilinear pairing computations. Since the implementation of pairing is much costlier than ordinary scalar point multiplication over elliptic curve. Therefore pairing free protocols over attribute-based authentication is much desirable especially in resource constraint network. The present paper employs elliptic curve arithmetic along with Lagrange interpolation instead of bilinear pairing computations. The authentication process of the protocol is information theoretically secure while the confidentiality of the shared key relies on the intractability of Elliptic Curve Discrete Logarithm Problem (ECDLP).


Attribute Based Encryption ECC Shamir secret sharing scheme Lagrange interpolation Broadcast encryption 


  1. 1.
    Smart, N.P.: Identity-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 38(13), 630–632 (2002)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (eds.) Advances in Cryptology—CRYPTO 2001, pp. 213–229. Springer, Berlin, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Shim, K.: Efficient id-based authenticated key agreement protocol based on Weil pairing. Electron. Lett. 39(8), 653–654 (2003)CrossRefGoogle Scholar
  4. 4.
    Wang, S., Cao, Z., Choo, K.-K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3), 307–318 (2009)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching, January 2007Google Scholar
  6. 6.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)Google Scholar
  7. 7.
    Vipul, G., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM, New York (2006)Google Scholar
  8. 8.
    Wang, H., Xu, Q., Fu, X.: Two-party attribute-based key agreement protocol in the standard modelGoogle Scholar
  9. 9.
    Wang, H., Xu, Q., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1042–1045, September 2009Google Scholar
  10. 10.
    Gorantla, M.C., Boyd, C., González Nieto, J.M.: Attribute-based authenticated key exchange. In: Steinfeld, R., Hawkes, P. (eds.) Information Security and Privacy, pp. 300–317. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Steinwandt, R., Corona, A.: Attribute-based group key establishment. IACR Cryptology ePrint Archive 2010:235, August 2010Google Scholar
  12. 12.
    Li, J., Yao, W., Zhang, Y., Qian, H., Han, J.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785–796 (2017)CrossRefGoogle Scholar
  13. 13.
    Han, J., Susilo, W., Mu, Y., Zhou, J., Au, M.H.A.: Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(3), 665–678 (2015)CrossRefGoogle Scholar
  14. 14.
    Qian, H., Li, J., Zhang, Y., Han, J.: Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Secur. 14(6), 487–497 (2015)CrossRefGoogle Scholar
  15. 15.
    Cheung, L., Cooley, J.A., Khazan, R.I., Newport, C.C.: Collusion-resistant group key management using attribute-based encryption. IACR Cryptology ePrint Archive 2007:161 (2007)Google Scholar
  16. 16.
    Bertino, E., Nabeel, M.: Poster: towards attribute based group key management, pp. 821–824 (2011)Google Scholar
  17. 17.
    Kumar, A.: Ternary tree based group key agreement protocol over elliptic curve for dynamic group (2014)CrossRefGoogle Scholar
  18. 18.
    Tate, J.T.: The arithmetic of elliptic curves. Invent. Math. 23(3), 179–206 (1974)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. IACR Cryptology ePrint Archive, 2013:734 (2013)Google Scholar
  20. 20.
    Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput. 59(6), 842–846 (2010)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Hu, S., Li, J., Zhang, Y.: Two-party attribute-based key agreement protocol with constant-size ciphertext and key. Secur. Commun. Netw., (2018)Google Scholar
  23. 23.
    Tian, Y., Yang, G., Mu, Y., Liang, K., Yu, Y.: One-round attribute-based key exchange in the multi-party setting. In: Chen, L., Han, J. (eds.) Provable Security, pp. 227–243. Springer, Cham (2016)Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.National Institute of Technology, UttarakhandSrinagarIndia

Personalised recommendations