Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps

被引:2
|
作者
Jia, Huiwen [1 ]
Hu, Yupu [1 ]
Wang, Xu An [2 ]
Liu, Zheliang [1 ]
Xiong, Wei [1 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
[2] Engieering Univ CAPF, Xian, Peoples R China
关键词
multipartite non-interactive key exchange; multilinear maps; MCDH assumption; INTEGERS;
D O I
10.1109/3PGCIC.2015.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key agreement is a fundamental primitive in cryptography and the question of generalizing the celebrated 2 party non-interactive key exchange, Diffie-Hellman protocol, to a multipartite setting was left as an important open problem. Boneh and Silverberg proposed the notion of multilinear maps for the first time in 2003 and put forward a theoretical construction of multipartite non-interactive key exchange protocol from multilinear maps. In their protocol, however, the number of users N and the multilinearity k are related by N=k+1, resulting in the system initializing another multilinear map when the number of users who want to exchange a session key changes. In this paper, we describe two extensional schemes, which enables any less than or equal to N users derive a common shared key from an (N-1)-multilinear map. In addition, using our extensional schemes, we show a concrete scenario: The establishment of any discussion group in a user group. Furthermore, we analyze its security.
引用
收藏
页码:771 / 774
页数:4
相关论文
共 50 条
  • [21] Fine-Grained Non-interactive Key-Exchange: Constructions and Lower Bounds
    Afshar, Abtin
    Couteau, Geoffroy
    Mahmoody, Mohammad
    Sadeghi, Elahe
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 55 - 85
  • [22] Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions
    Wang, Yuyu
    Su, Chuanjie
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 251 - 285
  • [23] Public-key encryption with non-interactive opening
    Damgard, Ivan
    Hofheinz, Dennis
    Kiltz, Eike
    Thorbek, Rune
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 239 - +
  • [24] SKENO: Secret key encryption with non-interactive opening
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 63 - 74
  • [25] Interactive and Non-Interactive Hybrid Immigrants Schemes for Ant Algorithms in Dynamic Environments
    Mavrovouniotis, Michalis
    Yang, Shengxiang
    2014 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2014, : 1542 - 1549
  • [26] IoT Devices with Non-interactive Key Management Protocol
    Gagneja, Kanwalinderjit
    Kiefer, Riley
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [27] Dynamic, Non-Interactive Key Management for the Bundle Protocol
    Van Besien, William L.
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON CHALLENGED NETWORKS (CHANTS '10), 2010, : 75 - 77
  • [28] Efficient and Non-Interactive Hierarchical Key Agreement in WSNs
    Kim, Hyunsung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 159 - 170
  • [29] Disavowable Public Key Encryption with Non-Interactive Opening
    Ishida, Ai
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (12) : 2446 - 2455
  • [30] ID-based cryptographic schemes using a non-interactive public-key distribution system
    Tseng, YM
    Jan, JK
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 237 - 243