Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps

被引:2
|
作者
Jia, Huiwen [1 ]
Hu, Yupu [1 ]
Wang, Xu An [2 ]
Liu, Zheliang [1 ]
Xiong, Wei [1 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
[2] Engieering Univ CAPF, Xian, Peoples R China
关键词
multipartite non-interactive key exchange; multilinear maps; MCDH assumption; INTEGERS;
D O I
10.1109/3PGCIC.2015.15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key agreement is a fundamental primitive in cryptography and the question of generalizing the celebrated 2 party non-interactive key exchange, Diffie-Hellman protocol, to a multipartite setting was left as an important open problem. Boneh and Silverberg proposed the notion of multilinear maps for the first time in 2003 and put forward a theoretical construction of multipartite non-interactive key exchange protocol from multilinear maps. In their protocol, however, the number of users N and the multilinearity k are related by N=k+1, resulting in the system initializing another multilinear map when the number of users who want to exchange a session key changes. In this paper, we describe two extensional schemes, which enables any less than or equal to N users derive a common shared key from an (N-1)-multilinear map. In addition, using our extensional schemes, we show a concrete scenario: The establishment of any discussion group in a user group. Furthermore, we analyze its security.
引用
收藏
页码:771 / 774
页数:4
相关论文
共 50 条
  • [31] An efficient and non-interactive hierarchical key agreement protocol
    Guo, Hua
    Mu, Yi
    Li, Zhoujun
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2011, 30 (01) : 28 - 34
  • [32] Non-Interactive Information Reconciliation for Quantum Key Distribution
    Rass, Stefan
    Schartner, Peter
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1054 - 1060
  • [33] Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
    Yu Chen
    Qiong Huang
    Zongyang Zhang
    International Journal of Information Security, 2016, 15 : 15 - 33
  • [34] Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes
    C. Blundo
    B. Masucci
    D. R. Stinson
    R. Wei
    Designs, Codes and Cryptography, 2002, 26 : 97 - 110
  • [35] Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
    Chakraborty, Suvradip
    Alawatugoda, Janaka
    Rangan, C. Pandu
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 167 - 187
  • [36] Constructions and bounds for unconditionally secure non-interactive commitment schemes
    Blundo, C
    Masucci, B
    Stinson, DR
    Wei, R
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 26 (1-3) : 97 - 110
  • [37] Key Encapsulation Mechanism from Multilinear Maps
    Lv, Liqun
    Sun, Wenjun
    Yang, Xiaoyuan
    Wang, Xuan
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 349 - 357
  • [38] Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited
    Chen, Yu
    Huang, Qiong
    Zhang, Zongyang
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 274 - 289
  • [39] HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
    Choudhary, Simran
    Gupta, Anil
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 34
  • [40] Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
    Salimi, Majid
    Mala, Hamid
    Martin, Honorio
    Peris-Lopez, Pedro
    IEEE ACCESS, 2020, 8 : 8821 - 8833