Two non-interactive key agreement protocols under certificateless scenarios

被引:0
|
作者
Sang, Yongxuan [1 ]
Zhang, Lili [2 ]
You, Lin [1 ]
Li, Zhongwen [3 ]
机构
[1] School of Telecommunication Engineering, Hangzhou Dianzi University, China
[2] Information Technology Tnstitute, Huanghe S and T College, China
[3] Information science and technology college, Chengdu University, China
关键词
Access control - Security systems;
D O I
10.4156/ijact.vol4.issue6.38
中图分类号
学科分类号
摘要
Key agreement protocol is one of the fundamental primitives of cryptography. It allows two or more parties to establish secret keys securely in the presence of an eavesdropping adversary. In this paper, two certificateless non-interactive key agreement protocols were proposed under certificateless scenarios, which have obvious advantages in the amount of computation and communication. We perform a security analysis of the schemes. We also show that the second protocol can be used to establish keys between members of distinct domains (under different KGCs). The proposed schemes can be used to construct secret sharing scheme.
引用
收藏
页码:331 / 337
相关论文
共 50 条
  • [41] Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM
    Duman, Julien
    Hartmann, Dominik
    Kiltz, Eike
    Kunzweiler, Sabrina
    Lehmann, Jonas
    Riepel, Doreen
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT II, 2022, 13792 : 36 - 66
  • [42] Attribute-based non-interactive key exchange
    Tang, Fei
    Zhang, Rui
    Li, Hongda
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (01)
  • [43] Disavowable Public Key Encryption with Non-Interactive Opening
    Ishida, Ai
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (12) : 2446 - 2455
  • [44] Attribute-based non-interactive key exchange
    Fei TANG
    Rui ZHANG
    Hongda LI
    ScienceChina(InformationSciences), 2017, 60 (01) : 208 - 210
  • [45] Efficient two-party certificateless authenticated key agreement protocol under GDH assumption
    Xie, Yong
    Wu, Libing
    Shen, Jian
    Li, Li
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 30 (01) : 11 - 25
  • [46] Non-Interactive Information Reconciliation for Quantum Key Distribution
    Rass, Stefan
    Schartner, Peter
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1054 - 1060
  • [47] Unbounded Non-Malleable Non-Interactive Zero Knowledge Protocols for NP
    Huang Guifang
    Lin Dongdai
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03): : 400 - 404
  • [48] A Practical Anti-collusion Hierarchical Identity-based Non-interactive Key Agreement for Wireless Networks
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Tao, Jing
    Liu, Liu
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 89 - 95
  • [49] Non-abelian key agreement protocols
    Anshel, I
    Anshel, M
    Goldfeld, D
    DISCRETE APPLIED MATHEMATICS, 2003, 130 (01) : 3 - 12
  • [50] Non-Interactive Fair Deniable Authentication Protocols with Indistinguishable Confidentiality and Anonymity
    Hwang, Shin-Jia
    Chi, Jen-Fu
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 305 - 318