Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions

被引:0
|
作者
Wang, Yuyu [1 ]
Su, Chuanjie [1 ]
Pan, Jiaxin [2 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ Kassel, Kassel, Germany
来源
关键词
Multi-party non-interactive key exchange; fine-grained cryptography; complexity assumptions;
D O I
10.1007/978-3-031-68379-4_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study multi-party non-interactive key exchange (NIKE) in the fine-grained setting. More precisely, we propose three multi-party NIKE schemes in three computation models, namely, the bounded parallel-time, bounded time, and bounded storage models. Their security is based on a very mild assumption (e.g., NC1 (sic) circle plus L/poly) or even without any complexity assumption. This improves the recent work of Afshar, Couteau, Mahmoody, and Sadeghi (EUROCRYPT 2023) that requires idealized assumptions, such as random oracles or generic groups. Additionally, we show that all our constructions satisfy a natural desirable property that we refer to as extendability, and we give generic transformations from extendable multi-party NIKE to multi-party identity-based NIKEs in the fine-grained settings.
引用
收藏
页码:251 / 285
页数:35
相关论文
共 50 条
  • [11] FINE-GRAINED COLOUR DISCRIMINATION WITHOUT FINE-GRAINED COLOUR
    Gert, Joshua
    AUSTRALASIAN JOURNAL OF PHILOSOPHY, 2015, 93 (03) : 602 - 605
  • [12] Towards Tight Adaptive Security of Non-interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    Langrehr, Roman
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT III, 2021, 13044 : 286 - 316
  • [13] On the Security of Non-Interactive Key Exchange against Related-Key Attacks
    Morita, Hiraku
    Schuldt, Jacob C. N.
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1910 - 1923
  • [14] Non-Interactive Key Exchange from Identity-Based Encryption
    Blazy, Olivier
    Chevalier, Celine
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [15] Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation
    Lee, Young Kyung
    Lee, Dong Hoon
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [16] MODRED: A code-based non-interactive key exchange protocol
    Pei, Junling
    Fu, Fang-Wei
    THEORETICAL COMPUTER SCIENCE, 2024, 1021
  • [17] A Non-interactive Shuffle Argument with Low Trust Assumptions
    Aggelakis, Antonis
    Fauzi, Prastudy
    Korfiatis, Georgios
    Louridas, Panos
    Mergoupis-Anagnou, Foteinos
    Siim, Janno
    Zajac, Michal
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 667 - 692
  • [18] Multidimensional interactive fine-grained image retrieval
    Hsiang, J
    Liu, WJ
    Chen, BC
    Tu, HC
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I, PROCEEDINGS, 2003, : 297 - 300
  • [19] SMOKE: Fine-grained Lineage at Interactive Speed
    Psallidas, Fotis
    Wu, Eugene
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2018, 11 (06): : 719 - 732
  • [20] Similarity Comparisons for Interactive Fine-Grained Categorization
    Wah, Catherine
    Van Horn, Grant
    Branson, Steve
    Maji, Subhransu
    Perona, Pietro
    Belongie, Serge
    2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2014, : 859 - 866