Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation

被引:10
|
作者
Khurana, Dakshita [1 ]
Rao, Vanishree [2 ]
Sahai, Amit [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Ctr Encrypted Funct, Los Angeles, CA 90024 USA
[2] PARC, Palo Alto, CA USA
关键词
FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.1007/978-3-662-48797-6_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users, (2) require a trusted setup, or (3) rely on knowledge-type assumptions. We construct the first non-interactive key exchange protocols which support an unbounded number of parties and have a security proof that does not rely on knowledge assumptions. Our non-interactive key-exchange protocol does not require a trusted setup and extends easily to the identity-based setting. Our protocols suffer only a polynomial loss to the underlying hardness assumptions.
引用
收藏
页码:52 / 75
页数:24
相关论文
共 50 条
  • [1] Multi-party Key Exchange Protocols from Supersingular Isogenies
    Furukawa, Satoshi
    Kunihiro, Noboru
    Takashima, Katsuyuki
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 208 - 212
  • [2] Unbounded Multi-party Computation from Learning with Errors
    Ananth, Prabhanjan
    Jain, Abhishek
    Jin, Zhengzhong
    Malavolta, Giulio
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 754 - 781
  • [3] Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation
    Lee, Young Kyung
    Lee, Dong Hoon
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [4] Optimally-Fair Multi-party Exchange Without Trusted Parties
    Maffei, Ivo
    Roscoe, A. W.
    [J]. COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 313 - 333
  • [5] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
    Boneh, Dan
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 480 - 499
  • [6] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
    Boneh, Dan
    Zhandry, Mark
    [J]. ALGORITHMICA, 2017, 79 (04) : 1233 - 1285
  • [7] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
    Dan Boneh
    Mark Zhandry
    [J]. Algorithmica, 2017, 79 : 1233 - 1285
  • [8] Multi-Party Key-Exchange with Perfect Forward Secrecy
    Mandal, Susmita
    Mohanty, Sujata
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 362 - 367
  • [9] Authenticated multi-party key agreement
    Just, Mike
    Vaudenay, Serge
    [J]. Lecture Notes in Computer Science, 1163
  • [10] A multi-party rational exchange protocol
    Alcaide, Almudena
    Estevez-Tapiador, Juan M.
    Hernandez-Castro, Julio C.
    Ribagorda, Arturo
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 1, PROCEEDINGS, 2007, 4805 : 42 - +