Two non-interactive key agreement protocols under certificateless scenarios

被引:0
|
作者
Sang, Yongxuan [1 ]
Zhang, Lili [2 ]
You, Lin [1 ]
Li, Zhongwen [3 ]
机构
[1] School of Telecommunication Engineering, Hangzhou Dianzi University, China
[2] Information Technology Tnstitute, Huanghe S and T College, China
[3] Information science and technology college, Chengdu University, China
关键词
Access control - Security systems;
D O I
10.4156/ijact.vol4.issue6.38
中图分类号
学科分类号
摘要
Key agreement protocol is one of the fundamental primitives of cryptography. It allows two or more parties to establish secret keys securely in the presence of an eavesdropping adversary. In this paper, two certificateless non-interactive key agreement protocols were proposed under certificateless scenarios, which have obvious advantages in the amount of computation and communication. We perform a security analysis of the schemes. We also show that the second protocol can be used to establish keys between members of distinct domains (under different KGCs). The proposed schemes can be used to construct secret sharing scheme.
引用
收藏
页码:331 / 337
相关论文
共 50 条
  • [31] Conference key agreement protocol with non-interactive fault-tolerance over broadcast network
    Cheng, Jiin-Chiou
    Laih, Chi-Sung
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 37 - 48
  • [32] ADAPTIVE AND COMPOSABLE NON-INTERACTIVE STRING-COMMITMENT PROTOCOLS
    Zhu, Huafei
    Araragi, Tadashi
    Nishide, Takashi
    Sakurai, Kouichi
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 354 - 361
  • [33] The essential design principles of verifiable non-interactive OT protocols
    Chang, Ya-Fen
    Shiao, Wei-Cheng
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 241 - +
  • [34] A non-interactive and efficient key agreement protocol for ASNs - art. no. 67950P
    Yang Deming
    Mu Dejun
    Xu Zhong
    SECOND INTERNATIONAL CONFERENCE ON SPACE INFORMATION TECHNOLOGY, PTS 1-3, 2007, 6795 : P7950 - P7950
  • [35] Public-key encryption with non-interactive opening
    Damgard, Ivan
    Hofheinz, Dennis
    Kiltz, Eike
    Thorbek, Rune
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 239 - +
  • [36] SKENO: Secret key encryption with non-interactive opening
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 63 - 74
  • [37] IoT Devices with Non-interactive Key Management Protocol
    Gagneja, Kanwalinderjit
    Kiefer, Riley
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [38] Dynamic, Non-Interactive Key Management for the Bundle Protocol
    Van Besien, William L.
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON CHALLENGED NETWORKS (CHANTS '10), 2010, : 75 - 77
  • [39] Adaptive and Composable Non-interactive String-Commitment Protocols
    Zhu, Huafei
    Araragi, Tadashi
    Nishide, Takashi
    Sakurai, Kouichi
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 233 - +