Fine-Grained Non-interactive Key Exchange, Revisited

被引:0
|
作者
Bauer, Balthazar [1 ]
Couteau, Geoffroy [2 ]
Sadeghi, Elahe [3 ]
机构
[1] UVSQ, Versailles, France
[2] Univ Paris Cite, IRIF, CNRS, Paris, France
[3] Univ Texas Austin, Austin, TX 78712 USA
来源
关键词
DISCRETE LOGARITHM; MERKLE PUZZLES; ALGORITHMS;
D O I
10.1007/978-3-031-68379-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the construction of multiparty non-interactive key-exchange protocols with fine-grained security, which was recently studied in (Afshar et al., Eurocrypt 2023). Their work introduced a 4-party non-interactive key exchange with quadratic hardness, and proved it secure in Shoup's generic group model. This positive result was complemented with a proof that n-party non-interactive key exchange with superquadratic security cannot exist in Maurer's generic group model, for any n >= 3. Because Shoup's model is stronger than Maurer's model, this leaves a gap between the positive and the negative result, and their work left as an open question the goal of closing this gap, and of obtaining fine-grained non-interactive key exchange without relying on idealized models. In this work, we make significant progress on both questions. We obtain two main results: - A 4-party non-interactive key exchange protocol with quadratic security gap, assuming the existence of exponentially secure injective pseudorandom generators, and the subexponential hardness of the computational Diffie-Hellman assumption. In addition, our scheme is conceptually simpler, and can be generalized to other settings (with more parties or from other assumptions). - Assuming the existence of non-uniformly secure injective pseudorandom generators with exponential hardness, we further show that our protocol is secure in Maurer's model, albeit with a smaller hardness gap (up to N-1.6), making progress on filling the gap between the positive and the negative result of (Afshar et al., Eurocrypt 2023). Somewhat intriguingly, proving the security of our scheme in Maurer's idealized model turns out to be significantly harder than proving its security in the standard model.
引用
收藏
页码:286 / 312
页数:27
相关论文
共 50 条
  • [1] Fine-Grained Non-interactive Key-Exchange: Constructions and Lower Bounds
    Afshar, Abtin
    Couteau, Geoffroy
    Mahmoody, Mohammad
    Sadeghi, Elahe
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 55 - 85
  • [2] Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions
    Wang, Yuyu
    Su, Chuanjie
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 251 - 285
  • [3] Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
    Wang, Yuyu
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 305 - 335
  • [4] Non-Interactive Key Exchange
    Freire, Eduarda S. V.
    Hofheinz, Dennis
    Kiltz, Eike
    Paterson, Kenneth G.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 254 - 271
  • [5] A Survey of Non-Interactive Key Exchange
    Zhang M.-R.
    Zhang R.
    Zhang L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
  • [6] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
  • [7] Attribute-based non-interactive key exchange
    Tang, Fei
    Zhang, Rui
    Li, Hongda
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (01)
  • [8] Attribute-based non-interactive key exchange
    Fei TANG
    Rui ZHANG
    Hongda LI
    ScienceChina(InformationSciences), 2017, 60 (01) : 208 - 210
  • [9] Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
    Yu Chen
    Qiong Huang
    Zongyang Zhang
    International Journal of Information Security, 2016, 15 : 15 - 33
  • [10] Fine-Grained Cryptography Revisited
    Shohei Egashira
    Yuyu Wang
    Keisuke Tanaka
    Journal of Cryptology, 2021, 34