
Previous Article
On the least covering radius of binary linear codes of dimension 6
 AMC Home
 This Issue

Next Article
On the generalized joint linear complexity profile of a class of nonlinear pseudorandom multisequences
Attributebased group key establishment
1.  Department of Mathematical Sciences, Florida Atlantic University, Boca Raton, FL 33431, United States 
2.  Departamento de Matemáticas, Universidad de Oviedo, 33007 Oviedo, Spain 
After detailing the security model, we give a tworound solution in the random oracle model. As main technical tool we introduce a notion of attributebased signcryption, which may be of independent interest. We show that the type of signcryption needed can be realized through the encryptthensign paradigm. Further, we discuss additional guarantees of the proposed protocol, that can be interpreted in terms of deniability and privacy.
[1] 
Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, Zhi Tian, Kemal Akkaya, and Limin Sun. CP_ABSC: An attributebased signcryption scheme to secure multicast communications in smart grids. Mathematical Foundations of Computing, 2018, 1 (1) : 77100. doi: 10.3934/mfc.2018005 
[2] 
Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489507. doi: 10.3934/amc.2007.1.489 
[3] 
Rainer Steinwandt, Adriana Suárez Corona. Cryptanalysis of a 2party key establishment based on a semigroup action problem. Advances in Mathematics of Communications, 2011, 5 (1) : 8792. doi: 10.3934/amc.2011.5.87 
[4] 
Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281305. doi: 10.3934/amc.2010.4.281 
[5] 
Anton Stolbunov. Constructing publickey cryptographic schemes based on class group action on a set of isogenous elliptic curves. Advances in Mathematics of Communications, 2010, 4 (2) : 215235. doi: 10.3934/amc.2010.4.215 
[6] 
Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281286. doi: 10.3934/amc.2007.1.281 
[7] 
Vani Rajasekar, Premalatha Jayapaul, Sathya Krishnamoorthi. Cryptanalysis and enhancement of multi factor remote user authentication scheme based on signcryption. Advances in Mathematics of Communications, 2020 doi: 10.3934/amc.2020103 
[8] 
Mohamed Baouch, Juan Antonio LópezRamos, Blas Torrecillas, Reto Schnyder. An active attack on a distributed Group Key Exchange system. Advances in Mathematics of Communications, 2017, 11 (4) : 715717. doi: 10.3934/amc.2017052 
[9] 
Mohammad Sadeq Dousti, Rasool Jalili. FORSAKES: A forwardsecure authenticated key exchange protocol based on symmetric keyevolving schemes. Advances in Mathematics of Communications, 2015, 9 (4) : 471514. doi: 10.3934/amc.2015.9.471 
[10] 
Sikhar Patranabis, Debdeep Mukhopadhyay. Identitybased key aggregate cryptosystem from multilinear maps. Advances in Mathematics of Communications, 2019, 13 (4) : 759778. doi: 10.3934/amc.2019044 
[11] 
Riccardo Aragona, Marco Calderini, Roberto Civino. Some grouptheoretical results on Feistel Networks in a longkey scenario. Advances in Mathematics of Communications, 2020, 14 (4) : 727743. doi: 10.3934/amc.2020093 
[12] 
Xinwei Gao. Comparison analysis of Ding's RLWEbased key exchange protocol and NewHope variants. Advances in Mathematics of Communications, 2019, 13 (2) : 221233. doi: 10.3934/amc.2019015 
[13] 
Jie Xu, Lanjun Dang. An efficient RFID anonymous batch authentication protocol based on group signature. Discrete & Continuous Dynamical Systems  S, 2019, 12 (4&5) : 14891500. doi: 10.3934/dcdss.2019102 
[14] 
Zhen Ming Ma, Ze Shui Xu, Wei Yang. Approach to the consistency and consensus of Pythagorean fuzzy preference relations based on their partial orders in group decision making. Journal of Industrial & Management Optimization, 2020 doi: 10.3934/jimo.2020086 
[15] 
Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169187. doi: 10.3934/amc.2010.4.169 
[16] 
Andreas Klein. How to say yes, no and maybe with visual cryptography. Advances in Mathematics of Communications, 2008, 2 (3) : 249259. doi: 10.3934/amc.2008.2.249 
[17] 
Jintai Ding, Sihem Mesnager, LihChung Wang. Letters for postquantum cryptography standard evaluation. Advances in Mathematics of Communications, 2020, 14 (1) : ii. doi: 10.3934/amc.2020012 
[18] 
AnnaLena HorlemannTrautmann, Violetta Weger. Information set decoding in the Lee metric with applications to cryptography. Advances in Mathematics of Communications, 2020 doi: 10.3934/amc.2020089 
[19] 
Ruben A. Proano, Sheldon H. Jacobson, Janet A. Jokela. A multiattribute approach for setting pediatric vaccine stockpile levels. Journal of Industrial & Management Optimization, 2010, 6 (4) : 709727. doi: 10.3934/jimo.2010.6.709 
[20] 
Yvo Desmedt, Niels Duif, Henk van Tilborg, Huaxiong Wang. Bounds and constructions for key distribution schemes. Advances in Mathematics of Communications, 2009, 3 (3) : 273293. doi: 10.3934/amc.2009.3.273 
2019 Impact Factor: 0.734
Tools
Metrics
Other articles
by authors
[Back to Top]