On Tightly Secure Non-Interactive Key Exchange

被引:15
|
作者
Hesse, Julia [1 ]
Hofheinz, Dennis [2 ]
Kohl, Lisa [2 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Karlsruhe Inst Technol, Karlsruhe, Germany
来源
关键词
PROOFS; ENCRYPTION;
D O I
10.1007/978-3-319-96881-0_3
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider the reduction loss of security reductions for non-interactive key exchange (NIKE) schemes. Currently, no tightly secure NIKE schemes exist, and in fact Bader et al. (EUROCRYPT 2016) provide a lower bound (of Omega(n(2)), where n is the number of parties an adversary interacts with) on the reduction loss for a large class of NIKE schemes. We offer two results: the first NIKE scheme with a reduction loss of n/2 that circumvents the lower bound of Bader et al., but is of course still far from tightly secure. Second, we provide a generalization of Bader et al.'s lower bound to a larger class of NIKE schemes (that also covers our NIKE scheme), with an adapted lower bound of n/2 on the reduction loss. Hence, in that sense, the reduction for our NIKE scheme is optimal.
引用
收藏
页码:65 / 94
页数:30
相关论文
共 50 条
  • [1] Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model
    Qian, Haifeng
    Li, Xiangxue
    Huang, Xinli
    [J]. INFORMATICA, 2012, 23 (03) : 443 - 460
  • [2] Non-Interactive Key Exchange
    Freire, Eduarda S. V.
    Hofheinz, Dennis
    Kiltz, Eike
    Paterson, Kenneth G.
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 254 - 271
  • [3] Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation
    Lee, Young Kyung
    Lee, Dong Hoon
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [4] A Survey of Non-Interactive Key Exchange
    Zhang, Ming-Rui
    Zhang, Rui
    Zhang, Lei
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
  • [5] Attribute-based non-interactive key exchange
    Tang, Fei
    Zhang, Rui
    Li, Hongda
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (01)
  • [6] Attribute-based non-interactive key exchange
    Fei TANG
    Rui ZHANG
    Hongda LI
    [J]. Science China(Information Sciences), 2017, 60 (01) : 208 - 210
  • [7] Provably secure non-interactive key distribution based on pairings
    Dupont, R
    Enge, A
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 270 - 276
  • [8] Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM
    Duman, Julien
    Hartmann, Dominik
    Kiltz, Eike
    Kunzweiler, Sabrina
    Lehmann, Jonas
    Riepel, Doreen
    [J]. ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT II, 2022, 13792 : 36 - 66
  • [9] HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
    Choudhary, Simran
    Gupta, Anil
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 34
  • [10] Fine-Grained Non-interactive Key Exchange, Revisited
    Bauer, Balthazar
    Couteau, Geoffroy
    Sadeghi, Elahe
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 286 - 312