Fine-Grained Non-interactive Key Exchange, Revisited

被引:0
|
作者
Bauer, Balthazar [1 ]
Couteau, Geoffroy [2 ]
Sadeghi, Elahe [3 ]
机构
[1] UVSQ, Versailles, France
[2] Univ Paris Cite, IRIF, CNRS, Paris, France
[3] Univ Texas Austin, Austin, TX 78712 USA
来源
关键词
DISCRETE LOGARITHM; MERKLE PUZZLES; ALGORITHMS;
D O I
10.1007/978-3-031-68379-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the construction of multiparty non-interactive key-exchange protocols with fine-grained security, which was recently studied in (Afshar et al., Eurocrypt 2023). Their work introduced a 4-party non-interactive key exchange with quadratic hardness, and proved it secure in Shoup's generic group model. This positive result was complemented with a proof that n-party non-interactive key exchange with superquadratic security cannot exist in Maurer's generic group model, for any n >= 3. Because Shoup's model is stronger than Maurer's model, this leaves a gap between the positive and the negative result, and their work left as an open question the goal of closing this gap, and of obtaining fine-grained non-interactive key exchange without relying on idealized models. In this work, we make significant progress on both questions. We obtain two main results: - A 4-party non-interactive key exchange protocol with quadratic security gap, assuming the existence of exponentially secure injective pseudorandom generators, and the subexponential hardness of the computational Diffie-Hellman assumption. In addition, our scheme is conceptually simpler, and can be generalized to other settings (with more parties or from other assumptions). - Assuming the existence of non-uniformly secure injective pseudorandom generators with exponential hardness, we further show that our protocol is secure in Maurer's model, albeit with a smaller hardness gap (up to N-1.6), making progress on filling the gap between the positive and the negative result of (Afshar et al., Eurocrypt 2023). Somewhat intriguingly, proving the security of our scheme in Maurer's idealized model turns out to be significantly harder than proving its security in the standard model.
引用
收藏
页码:286 / 312
页数:27
相关论文
共 50 条
  • [31] Amplification of Non-interactive Zero Knowledge, Revisited
    Bitansky, Nir
    Geier, Nathan
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2024, 14928 LNCS : 361 - 390
  • [32] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [33] Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange
    Siyao Guo
    Pritish Kamath
    Alon Rosen
    Katerina Sotiraki
    Journal of Cryptology, 2022, 35
  • [34] Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange
    Guo, Siyao
    Kamath, Pritish
    Rosen, Alon
    Sotiraki, Katerina
    JOURNAL OF CRYPTOLOGY, 2022, 35 (01)
  • [35] Fine-Grained Crowdsourcing for Fine-Grained Recognition
    Jia Deng
    Krause, Jonathan
    Li Fei-Fei
    2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2013, : 580 - 587
  • [36] Fine-grained device management in an interactive media server
    Rangaswami, R
    Dimitrijevic, Z
    Chang, E
    Chan, SHG
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (04) : 558 - 569
  • [37] Public-Key Cryptography in the Fine-Grained Setting
    LaVigne, Rio
    Lincoln, Andrea
    Williams, Virginia Vassilevska
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 605 - 635
  • [38] Public-key encryption with non-interactive opening
    Damgard, Ivan
    Hofheinz, Dennis
    Kiltz, Eike
    Thorbek, Rune
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 239 - +
  • [39] SKENO: Secret key encryption with non-interactive opening
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 63 - 74
  • [40] IoT Devices with Non-interactive Key Management Protocol
    Gagneja, Kanwalinderjit
    Kiefer, Riley
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,