...
首页> 外文期刊>Quality Control, Transactions >Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange
【24h】

Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange

机译:全部弹性内存 - 最佳多方非交互式密钥交换

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Multi-Party Non-Interactive Key Exchange (MP-NIKE) is a fundamental cryptographic primitive in which users register into a key generation centre and receive a public/private key pair each. After that, any subset of these users can compute a shared key without any interaction. Nowadays, IoT devices suffer from a high number and large size of messages exchanged in the Key Management Protocol (KMP). To overcome this, an MP-NIKE scheme can eliminate the airtime and latency of messages transferred between IoT devices. MP-NIKE schemes can be realized by using multilinear maps. There are several attempts for constructing multilinear maps based on indistinguishable obfuscation, lattices and the Chinese Remainder Theorem (CRT). Nevertheless, these schemes are inefficient in terms of computation cost and memory overhead. Besides, several attacks have been recently reported against CRT-based and lattice-based multilinear maps. There is only one modular exponentiation-based MP-NIKE scheme in the literature which has been claimed to be both secure and efficient. In this article, we present an attack on this scheme based on the Euclidean algorithm, in which two colluding users can obtain the shared key of any arbitrary subgroup of users. We also propose an efficient and secure MP-NIKE scheme. We show how our proposal is secure in the random oracle model assuming the hardness of the root extraction modulo a composite number.
机译:多方非交互式密钥交换(MP-Nike)是一个基本的加密原语,用户在其中注册到密钥生成中心并接收每个公共/私钥对。之后,这些用户的任何子集都可以在没有任何交互的情况下计算共享密钥。如今,IoT设备在密钥管理协议(KMP)中交换了高分性和大尺寸的消息。为了克服这一点,MP-Nike方案可以消除在IOT设备之间传输的消息的通话时间和延迟。可以通过使用多线性映射来实现MP-Nike方案。基于无法区分的混淆,格子和中国剩余定理(CRT),有几次尝试构建多线性地图。然而,这些方案在计算成本和存储器开销方面效率低。此外,最近已经报告了几种攻击对基于CRT和基于格子的多线性地图。在文献中只有一个基于模块化的代幂的MP-Nike方案,被声称既安全有效。在本文中,我们在基于欧几里德算法的基础上对该方案进行了攻击,其中两个勾结用户可以获得用户的任何任意子组的共享密钥。我们还提出了一种高效和安全的MP-Nike计划。我们展示了我们的提议在随机Oracle模型中是如何安全的,假设根提取Modulo的硬度是复合数字的硬度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号