Non-Interactive Key Exchange

被引:0
|
作者
Freire, Eduarda S. V. [1 ]
Hofheinz, Dennis [2 ]
Kiltz, Eike [3 ]
Paterson, Kenneth G. [1 ]
机构
[1] Royal Holloway Univ London, London, England
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2013 | 2013年 / 7778卷
基金
英国工程与自然科学研究理事会;
关键词
non-interactive key exchange; public-key cryptography; pairings; IDENTITY-BASED ENCRYPTION; DIFFIE-HELLMAN; SECURE; SIGNATURES; AGREEMENT; PROTOCOLS; ATTACKS; PROOFS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, we provide different security models for this primitive and explore the relationships between them. We then give constructions for secure NIKE in the Random Oracle Model based on the hardness of factoring and in the standard model based on the hardness of a variant of the decisional Bilinear Diffie Hellman Problem for asymmetric pairings. We also study the relationship between NIKE and public key encryption (PKE), showing that a secure NIKE scheme can be generically converted into an IND-CCA secure PKE scheme. Our conversion also illustrates the fundamental nature of NIKE in public key cryptography.
引用
收藏
页码:254 / 271
页数:18
相关论文
共 50 条
  • [31] Non-interactive Zero-Knowledge from LPN and MQ
    Dao, Quang
    Jain, Aayush
    Jin, Zhengzhong
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IX, 2024, 14928 : 321 - 360
  • [32] Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation
    Quanyun Wei
    Fang Qi
    Zhe Tang
    Telecommunication Systems, 2018, 69 : 253 - 262
  • [33] ZERO-KNOWLEDGE SUCCINCT NON-INTERACTIVE ARGUMENTS OF KNOWLEDGE BASED ON SETS OF POLYNOMIALS
    Martynenkov, I. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (59): : 20 - 57
  • [34] Adaptively Secure Non-interactive Threshold Cryptosystems
    Libert, Benoit
    Yung, Moti
    Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
  • [35] On Non-Interactive Simulation of Binary Random Variables
    Yu, Lei
    Tan, Vincent Y. F.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (04) : 2528 - 2538
  • [36] An Efficient and Transparent One-Time Authentication Protocol with Non-Interactive Key Scheduling and Update
    Castiglione, Arcangelo
    De Santis, Alfredo
    Castiglione, Aniello
    Palmieri, Francesco
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 351 - 358
  • [37] Conference key agreement protocol with non-interactive fault-tolerance over broadcast network
    Cheng, Jiin-Chiou
    Laih, Chi-Sung
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 37 - 48
  • [38] SPHF-Friendly Non-interactive Commitments
    Abdalla, Michel
    Benhamouda, Fabrice
    Blazy, Olivier
    Chevalier, Celine
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 214 - 234
  • [39] Adaptively secure non-interactive threshold cryptosystems
    Libert, Benoit
    Yung, Moti
    THEORETICAL COMPUTER SCIENCE, 2013, 478 : 76 - 100
  • [40] Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning
    Zhu, Yin
    Gong, Junqing
    Zhang, Kai
    Qian, Haifeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5600 - 5616