TY - GEN
T1 - Multi-party key exchange for unbounded parties from indistinguishability obfuscation
AU - Khurana, Dakshita
AU - Rao, Vanishree
AU - Sahai, Amit
N1 - D. Khurana and A. Sahai—Research supported in part from a DARPA/ARL SAFEWARE award, NSF Frontier Award 1413955, NSF grants 1228984, 1136174, 1118096, and 1065276, a Xerox Faculty Research Award, a Google Faculty Research Award, an equipment grant from Intel, and an Okawa Foundation Research Grant. This material is based upon work supported by the Defense Advanced Research Projects Agency through the ARL under Contract W911NF-15-C-0205. The views expressed are those of the authors and do not reflect the official policy or position of the Department of Defense, the National Science Foundation, or the U.S. Government. V. Rao—Work done while studying at UCLA.
PY - 2015
Y1 - 2015
N2 - Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users, (2) require a trusted setup, or (3) rely on knowledge-type assumptions. We construct the first non-interactive key exchange protocols which support an unbounded number of parties and have a security proof that does not rely on knowledge assumptions. Our non-interactive keyexchange protocol does not require a trusted setup and extends easily to the identity-based setting. Our protocols suffer only a polynomial loss to the underlying hardness assumptions.
AB - Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users, (2) require a trusted setup, or (3) rely on knowledge-type assumptions. We construct the first non-interactive key exchange protocols which support an unbounded number of parties and have a security proof that does not rely on knowledge assumptions. Our non-interactive keyexchange protocol does not require a trusted setup and extends easily to the identity-based setting. Our protocols suffer only a polynomial loss to the underlying hardness assumptions.
UR - https://www.scopus.com/pages/publications/84961279494
UR - https://www.scopus.com/pages/publications/84961279494#tab=citedBy
U2 - 10.1007/978-3-662-48797-6_3
DO - 10.1007/978-3-662-48797-6_3
M3 - Conference contribution
AN - SCOPUS:84961279494
SN - 9783662487969
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 52
EP - 75
BT - Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings
A2 - Cheon, Jung Hee
A2 - Iwata, Tetsu
PB - Springer
T2 - 21st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2015
Y2 - 29 November 2015 through 3 December 2015
ER -