Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions

被引:0
|
作者
Wang, Yuyu [1 ]
Su, Chuanjie [1 ]
Pan, Jiaxin [2 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ Kassel, Kassel, Germany
来源
关键词
Multi-party non-interactive key exchange; fine-grained cryptography; complexity assumptions;
D O I
10.1007/978-3-031-68379-4_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study multi-party non-interactive key exchange (NIKE) in the fine-grained setting. More precisely, we propose three multi-party NIKE schemes in three computation models, namely, the bounded parallel-time, bounded time, and bounded storage models. Their security is based on a very mild assumption (e.g., NC1 (sic) circle plus L/poly) or even without any complexity assumption. This improves the recent work of Afshar, Couteau, Mahmoody, and Sadeghi (EUROCRYPT 2023) that requires idealized assumptions, such as random oracles or generic groups. Additionally, we show that all our constructions satisfy a natural desirable property that we refer to as extendability, and we give generic transformations from extendable multi-party NIKE to multi-party identity-based NIKEs in the fine-grained settings.
引用
收藏
页码:251 / 285
页数:35
相关论文
共 50 条
  • [21] Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
    Boneh, Dan
    Glass, Darren
    Krashen, Daniel
    Lauter, Kristin
    Sharif, Shahed
    Silverberg, Alice
    Tibouchi, Mehdi
    Zhandry, Mark
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 5 - 14
  • [22] Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps
    Jia, Huiwen
    Hu, Yupu
    Wang, Xu An
    Liu, Zheliang
    Xiong, Wei
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 771 - 774
  • [23] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [24] Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange
    Siyao Guo
    Pritish Kamath
    Alon Rosen
    Katerina Sotiraki
    Journal of Cryptology, 2022, 35
  • [25] Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange
    Guo, Siyao
    Kamath, Pritish
    Rosen, Alon
    Sotiraki, Katerina
    JOURNAL OF CRYPTOLOGY, 2022, 35 (01)
  • [26] Non-interactive Batch Arguments for NP from Standard Assumptions
    Choudhuri, Arka Rai
    Jain, Abhishek
    Jin, Zhengzhong
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT IV, 2021, 12828 : 394 - 423
  • [27] Fine-grained device management in an interactive media server
    Rangaswami, R
    Dimitrijevic, Z
    Chang, E
    Chan, SHG
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (04) : 558 - 569
  • [28] Fine-Grained Recognition without Part Annotations
    Krause, Jonathan
    Jin, Hailin
    Yang, Jianchao
    Li Fei-Fei
    2015 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2015, : 5546 - 5555
  • [29] On Actively Secure Fine-Grained Access Structures from Isogeny Assumptions
    Campos, Fabio
    Muth, Philipp
    POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 375 - 398
  • [30] Public-Key Cryptography in the Fine-Grained Setting
    LaVigne, Rio
    Lincoln, Andrea
    Williams, Virginia Vassilevska
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 605 - 635