Non-Interactive Key Exchange

被引:0
|
作者
Freire, Eduarda S. V. [1 ]
Hofheinz, Dennis [2 ]
Kiltz, Eike [3 ]
Paterson, Kenneth G. [1 ]
机构
[1] Royal Holloway Univ London, London, England
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2013 | 2013年 / 7778卷
基金
英国工程与自然科学研究理事会;
关键词
non-interactive key exchange; public-key cryptography; pairings; IDENTITY-BASED ENCRYPTION; DIFFIE-HELLMAN; SECURE; SIGNATURES; AGREEMENT; PROTOCOLS; ATTACKS; PROOFS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, we provide different security models for this primitive and explore the relationships between them. We then give constructions for secure NIKE in the Random Oracle Model based on the hardness of factoring and in the standard model based on the hardness of a variant of the decisional Bilinear Diffie Hellman Problem for asymmetric pairings. We also study the relationship between NIKE and public key encryption (PKE), showing that a secure NIKE scheme can be generically converted into an IND-CCA secure PKE scheme. Our conversion also illustrates the fundamental nature of NIKE in public key cryptography.
引用
收藏
页码:254 / 271
页数:18
相关论文
共 50 条
  • [1] A Survey of Non-Interactive Key Exchange
    Zhang M.-R.
    Zhang R.
    Zhang L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
  • [2] Towards Tight Adaptive Security of Non-interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    Langrehr, Roman
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 286 - 316
  • [3] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
  • [4] On the Security of Non-Interactive Key Exchange against Related-Key Attacks
    Morita, Hiraku
    Schuldt, Jacob C. N.
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1910 - 1923
  • [5] Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
    Boneh, Dan
    Glass, Darren
    Krashen, Daniel
    Lauter, Kristin
    Sharif, Shahed
    Silverberg, Alice
    Tibouchi, Mehdi
    Zhandry, Mark
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 5 - 14
  • [6] Certificateless Non-Interactive Key Exchange Protocol without Pairings
    Wei, Yun
    Wei, Fushan
    Ma, Chuangui
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 31 - 42
  • [7] Disavowable Public Key Encryption with Non-Interactive Opening
    Ishida, Ai
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (12) : 2446 - 2455
  • [8] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [9] Identity-based non-interactive key distribution with forward security
    Steinwandt, Rainer
    Suarez Corona, Adriana
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 195 - 208
  • [10] Identity-based non-interactive key distribution with forward security
    Rainer Steinwandt
    Adriana Suárez Corona
    Designs, Codes and Cryptography, 2012, 64 : 195 - 208