Non-Interactive Key Exchange

被引:0
|
作者
Freire, Eduarda S. V. [1 ]
Hofheinz, Dennis [2 ]
Kiltz, Eike [3 ]
Paterson, Kenneth G. [1 ]
机构
[1] Royal Holloway Univ London, London, England
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2013 | 2013年 / 7778卷
基金
英国工程与自然科学研究理事会;
关键词
non-interactive key exchange; public-key cryptography; pairings; IDENTITY-BASED ENCRYPTION; DIFFIE-HELLMAN; SECURE; SIGNATURES; AGREEMENT; PROTOCOLS; ATTACKS; PROOFS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, we provide different security models for this primitive and explore the relationships between them. We then give constructions for secure NIKE in the Random Oracle Model based on the hardness of factoring and in the standard model based on the hardness of a variant of the decisional Bilinear Diffie Hellman Problem for asymmetric pairings. We also study the relationship between NIKE and public key encryption (PKE), showing that a secure NIKE scheme can be generically converted into an IND-CCA secure PKE scheme. Our conversion also illustrates the fundamental nature of NIKE in public key cryptography.
引用
收藏
页码:254 / 271
页数:18
相关论文
共 50 条
  • [41] Making Sigma-Protocols Non-interactive Without Random Oracles
    Chaidos, Pyrros
    Groth, Jens
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 650 - 670
  • [42] Non-interactive Zero Knowledge from Sub-exponential DDH
    Jain, Abhishek
    Jin, Zhengzhong
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 3 - 32
  • [43] Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
    Gentry, Craig
    Halevi, Shai
    Lyubashevsky, Vadim
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 458 - 487
  • [44] Non-interactive Non-malleability from Quantum Supremacy
    Kalai, Yael Tauman
    Khurana, Dakshita
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 552 - 582
  • [45] Breaking and Repairing Damgard et al. Public Key Encryption Scheme with Non-interactive Opening
    Galindo, David
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 389 - 398
  • [46] On the Size of Pairing-Based Non-interactive Arguments
    Groth, Jens
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 305 - 326
  • [47] Group Encryption: Non-interactive Realization in the Standard Model
    Cathalo, Julien
    Libert, Benoit
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 179 - +
  • [48] Short Pairing-Based Non-interactive Zero-Knowledge Arguments
    Groth, Jens
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 321 - 340
  • [49] Short Non-interactive Zero-Knowledge Proofs
    Groth, Jens
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 341 - 358
  • [50] Non-Interactive Zero-Knowledge for Blockchain: A Survey
    Partala, Juha
    Nguyen, Tri Hong
    Pirttikangas, Susanna
    IEEE ACCESS, 2020, 8 : 227945 - 227961