Non-Interactive Key Exchange

被引:0
|
作者
Freire, Eduarda S. V. [1 ]
Hofheinz, Dennis [2 ]
Kiltz, Eike [3 ]
Paterson, Kenneth G. [1 ]
机构
[1] Royal Holloway Univ London, London, England
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2013 | 2013年 / 7778卷
基金
英国工程与自然科学研究理事会;
关键词
non-interactive key exchange; public-key cryptography; pairings; IDENTITY-BASED ENCRYPTION; DIFFIE-HELLMAN; SECURE; SIGNATURES; AGREEMENT; PROTOCOLS; ATTACKS; PROOFS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, we provide different security models for this primitive and explore the relationships between them. We then give constructions for secure NIKE in the Random Oracle Model based on the hardness of factoring and in the standard model based on the hardness of a variant of the decisional Bilinear Diffie Hellman Problem for asymmetric pairings. We also study the relationship between NIKE and public key encryption (PKE), showing that a secure NIKE scheme can be generically converted into an IND-CCA secure PKE scheme. Our conversion also illustrates the fundamental nature of NIKE in public key cryptography.
引用
收藏
页码:254 / 271
页数:18
相关论文
共 50 条
  • [21] Non-interactive Universal Arguments
    Bitansky, Nir
    Paneth, Omer
    Shamir, Dana
    Solomon, Tomer
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT II, 2023, 14082 : 132 - 158
  • [22] Non-interactive multisignatures in the plain public-key model with efficient verification
    Qian, Haifeng
    Xu, Shouhuai
    INFORMATION PROCESSING LETTERS, 2010, 111 (02) : 82 - 89
  • [23] Comment on “Identity-based non-interactive key distribution with forward security”
    Xi Jun Lin
    Ran Ren
    Zhengang Wei
    Lin Sun
    Designs, Codes and Cryptography, 2015, 75 : 1 - 7
  • [24] On the Security of a Non-Interactive Authenticated Key Agreement over Mobile Communication Networks
    Yau, W. C.
    Yap, W. S.
    Chin, J. J.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2021, 15 : 77 - 89
  • [25] Comment on "Identity-based non-interactive key distribution with forward security"
    Lin, Xi Jun
    Ren, Ran
    Wei, Zhengang
    Sun, Lin
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 75 (01) : 1 - 7
  • [26] Jackpot: Non-interactive Aggregatable Lotteries
    Fleischhacker, Nils
    Hall-Andersen, Mathias
    Simkin, Mark
    Wagner, Benedikt
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VI, 2025, 15489 : 365 - 397
  • [27] Towards Non-interactive Witness Hiding
    Kuykendall, Benjamin
    Zhandry, Mark
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 : 627 - 656
  • [28] Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions
    Galindo, David
    Libert, Benoit
    Fischlin, Marc
    Fuchsbauer, Georg
    Lehmann, Anja
    Manulis, Mark
    Schroeder, Dominique
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 333 - +
  • [29] Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation
    Wei, Quanyun
    Qi, Fang
    Tang, Zhe
    TELECOMMUNICATION SYSTEMS, 2018, 69 (02) : 253 - 262
  • [30] Tightly Secure Non-interactive BLS Multi-signatures
    Bacho, Renas
    Wagner, Benedikt
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT II, 2025, 15485 : 397 - 422