Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions

被引:0
|
作者
Wang, Yuyu [1 ]
Su, Chuanjie [1 ]
Pan, Jiaxin [2 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ Kassel, Kassel, Germany
来源
关键词
Multi-party non-interactive key exchange; fine-grained cryptography; complexity assumptions;
D O I
10.1007/978-3-031-68379-4_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study multi-party non-interactive key exchange (NIKE) in the fine-grained setting. More precisely, we propose three multi-party NIKE schemes in three computation models, namely, the bounded parallel-time, bounded time, and bounded storage models. Their security is based on a very mild assumption (e.g., NC1 (sic) circle plus L/poly) or even without any complexity assumption. This improves the recent work of Afshar, Couteau, Mahmoody, and Sadeghi (EUROCRYPT 2023) that requires idealized assumptions, such as random oracles or generic groups. Additionally, we show that all our constructions satisfy a natural desirable property that we refer to as extendability, and we give generic transformations from extendable multi-party NIKE to multi-party identity-based NIKEs in the fine-grained settings.
引用
收藏
页码:251 / 285
页数:35
相关论文
共 50 条
  • [41] An efficient and non-interactive hierarchical key agreement protocol
    Guo, Hua
    Mu, Yi
    Li, Zhoujun
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2011, 30 (01) : 28 - 34
  • [42] Non-Interactive Information Reconciliation for Quantum Key Distribution
    Rass, Stefan
    Schartner, Peter
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1054 - 1060
  • [43] Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
    Yu Chen
    Qiong Huang
    Zongyang Zhang
    International Journal of Information Security, 2016, 15 : 15 - 33
  • [44] An Interactive Deep Learning Method For Fine-grained Image Classification
    Luo, Liumin
    Wang, Mingxia
    Liu, Xiaoqing
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2025, 28 (04): : 701 - 708
  • [45] Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
    Chakraborty, Suvradip
    Alawatugoda, Janaka
    Rangan, C. Pandu
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 167 - 187
  • [46] Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing
    Wang, Qinqin
    Zhu, Yanqin
    Luo, Xizhao
    3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 145 - 150
  • [47] Fine-grained Entity Typing without Knowledge Base
    Qian, Jing
    Liu, Yibin
    Liu, Lemao
    Li, Yangming
    Jiang, Haiyun
    Zhang, Haisong
    Shi, Shuming
    2021 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2021), 2021, : 5309 - 5319
  • [48] Fine-Grained Head Pose Estimation Without Keypoints
    Ruiz, Nataniel
    Chong, Eunji
    Rehg, James M.
    PROCEEDINGS 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2018, : 2155 - 2164
  • [49] Scalable Annotation of Fine-Grained Categories Without Experts
    Gebru, Timnit
    Krause, Jonathan
    Deng, Jia
    Li Fei-Fei
    PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 1877 - 1881
  • [50] Non-Interactive Multiparty Computation Without Correlated Randomness
    Halevi, Shai
    Ishai, Yuval
    Jain, Abhishek
    Komargodski, Ilan
    Sahai, Amit
    Yogev, Eylon
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 181 - 211