Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions

被引:0
|
作者
Wang, Yuyu [1 ]
Su, Chuanjie [1 ]
Pan, Jiaxin [2 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ Kassel, Kassel, Germany
来源
关键词
Multi-party non-interactive key exchange; fine-grained cryptography; complexity assumptions;
D O I
10.1007/978-3-031-68379-4_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study multi-party non-interactive key exchange (NIKE) in the fine-grained setting. More precisely, we propose three multi-party NIKE schemes in three computation models, namely, the bounded parallel-time, bounded time, and bounded storage models. Their security is based on a very mild assumption (e.g., NC1 (sic) circle plus L/poly) or even without any complexity assumption. This improves the recent work of Afshar, Couteau, Mahmoody, and Sadeghi (EUROCRYPT 2023) that requires idealized assumptions, such as random oracles or generic groups. Additionally, we show that all our constructions satisfy a natural desirable property that we refer to as extendability, and we give generic transformations from extendable multi-party NIKE to multi-party identity-based NIKEs in the fine-grained settings.
引用
收藏
页码:251 / 285
页数:35
相关论文
共 50 条
  • [1] Fine-Grained Non-interactive Key-Exchange: Constructions and Lower Bounds
    Afshar, Abtin
    Couteau, Geoffroy
    Mahmoody, Mohammad
    Sadeghi, Elahe
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 55 - 85
  • [2] Fine-Grained Non-interactive Key Exchange, Revisited
    Bauer, Balthazar
    Couteau, Geoffroy
    Sadeghi, Elahe
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 286 - 312
  • [3] Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
    Wang, Yuyu
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 305 - 335
  • [4] Non-Interactive Key Exchange
    Freire, Eduarda S. V.
    Hofheinz, Dennis
    Kiltz, Eike
    Paterson, Kenneth G.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 254 - 271
  • [5] Certificateless Non-Interactive Key Exchange Protocol without Pairings
    Wei, Yun
    Wei, Fushan
    Ma, Chuangui
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 31 - 42
  • [6] A Survey of Non-Interactive Key Exchange
    Zhang M.-R.
    Zhang R.
    Zhang L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
  • [7] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
  • [8] Attribute-based non-interactive key exchange
    Tang, Fei
    Zhang, Rui
    Li, Hongda
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (01)
  • [9] Attribute-based non-interactive key exchange
    Fei TANG
    Rui ZHANG
    Hongda LI
    ScienceChina(InformationSciences), 2017, 60 (01) : 208 - 210
  • [10] Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM
    Duman, Julien
    Hartmann, Dominik
    Kiltz, Eike
    Kunzweiler, Sabrina
    Lehmann, Jonas
    Riepel, Doreen
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT II, 2022, 13792 : 36 - 66