Non-Interactive Key Exchange

被引:0
|
作者
Freire, Eduarda S. V. [1 ]
Hofheinz, Dennis [2 ]
Kiltz, Eike [3 ]
Paterson, Kenneth G. [1 ]
机构
[1] Royal Holloway Univ London, London, England
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
[3] Ruhr Univ Bochum, Bochum, Germany
来源
基金
英国工程与自然科学研究理事会;
关键词
non-interactive key exchange; public-key cryptography; pairings; IDENTITY-BASED ENCRYPTION; DIFFIE-HELLMAN; SECURE; SIGNATURES; AGREEMENT; PROTOCOLS; ATTACKS; PROOFS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic primitive. It appears as a major contribution in the ground-breaking paper of Diffie and Hellman, but NIKE has remained largely unstudied since then. In this paper, we provide different security models for this primitive and explore the relationships between them. We then give constructions for secure NIKE in the Random Oracle Model based on the hardness of factoring and in the standard model based on the hardness of a variant of the decisional Bilinear Diffie Hellman Problem for asymmetric pairings. We also study the relationship between NIKE and public key encryption (PKE), showing that a secure NIKE scheme can be generically converted into an IND-CCA secure PKE scheme. Our conversion also illustrates the fundamental nature of NIKE in public key cryptography.
引用
收藏
页码:254 / 271
页数:18
相关论文
共 50 条
  • [41] Non-interactive Zero-Knowledge from Non-interactive Batch Arguments
    Champion, Jeffrey
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT II, 2023, 14082 : 38 - 71
  • [42] On Identity-Based-Like Non-Interactive Key Establishment for Key Predistribution Schemes
    Urivskiy, Alexey
    PROCEEDINGS OF THE 2020 SEVENTEENTH INTERNATIONAL WORKSHOP ON ALGEBRAIC AND COMBINATORIAL CODING THEORY ALGEBRAIC AND COMBINATORIAL CODING THEORY (ACCT 2020): PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL WORKSHOP ON ALGEBRAIC AND COMBINATORIAL CODING THEORY ACCT 2020, 2020, : 150 - 155
  • [43] Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model
    Qian, Haifeng
    Li, Xiangxue
    Huang, Xinli
    INFORMATICA, 2012, 23 (03) : 443 - 460
  • [44] UC-Secure Non-Interactive Public-Key Encryption
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Samelin, Kai
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 217 - 233
  • [45] Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
    Wu, Tzong-Sun
    Lin, Han-Yu
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (05): : 594 - 599
  • [46] A SECURE GROUP COMMUNICATION USING NON-INTERACTIVE KEY COMPUTATION IN MULTIPARTY KEY AGREEMENT
    Kalaiselvi, S.
    Begum, S. Jabeen
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 568 - 572
  • [47] Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 5 - 13
  • [48] Adaptively-secure, non-interactive public-key encryption
    Canetti, R
    Halevi, S
    Katz, J
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 150 - 168
  • [49] A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks
    Yu, Chia-Mu
    Lu, Chun-Shien
    Kuo, Sy-Yen
    2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 360 - +
  • [50] Identity-based non-interactive key distribution with forward security
    Steinwandt, Rainer
    Suarez Corona, Adriana
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 195 - 208