Non-Interactive Key Exchange

被引:0
|
作者
Freire, Eduarda S. V. [1 ]
Hofheinz, Dennis [2 ]
Kiltz, Eike [3 ]
Paterson, Kenneth G. [1 ]
机构
[1] Royal Holloway Univ London, London, England
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
来源
基金
英国工程与自然科学研究理事会;
关键词
non-interactive key exchange; public-key cryptography; pairings; IDENTITY-BASED ENCRYPTION; DIFFIE-HELLMAN; SECURE; SIGNATURES; AGREEMENT; PROTOCOLS; ATTACKS; PROOFS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, we provide different security models for this primitive and explore the relationships between them. We then give constructions for secure NIKE in the Random Oracle Model based on the hardness of factoring and in the standard model based on the hardness of a variant of the decisional Bilinear Diffie Hellman Problem for asymmetric pairings. We also study the relationship between NIKE and public key encryption (PKE), showing that a secure NIKE scheme can be generically converted into an IND-CCA secure PKE scheme. Our conversion also illustrates the fundamental nature of NIKE in public key cryptography.
引用
收藏
页码:254 / 271
页数:18
相关论文
共 50 条
  • [31] Non-interactive zero-knowledge proof scheme from RLWE-based key exchange
    Xie, Shaofen
    Yao, Wang
    Wu, Faguo
    Zheng, Zhiming
    PLOS ONE, 2021, 16 (08):
  • [32] HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
    Choudhary, Simran
    Gupta, Anil
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 34
  • [33] Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
    Salimi, Majid
    Mala, Hamid
    Martin, Honorio
    Peris-Lopez, Pedro
    IEEE ACCESS, 2020, 8 : 8821 - 8833
  • [34] Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
    Chen, Yu
    Huang, Qiong
    Zhang, Zongyang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 15 - 33
  • [35] On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 74 : 883 - 889
  • [36] Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments
    Martin-Fernandez, Francisco
    Caballero-Gil, Pino
    Caballero-Gil, Candido
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 261 - 271
  • [37] Broadcast encryption based non-interactive key distribution in MANETs
    Yang, Yang
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 533 - 545
  • [38] On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 883 - 889
  • [39] Provably secure non-interactive key distribution based on pairings
    Dupont, R
    Enge, A
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 270 - 276
  • [40] Non-interactive key establishment in mobile ad hoc networks
    Li, Zhenjiang
    Garcia-Luna-Aceves, J. J.
    AD HOC NETWORKS, 2007, 5 (07) : 1194 - 1203