Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users, (2) require a trusted setup, or (3) rely on knowledge-type assumptions. We construct the first non-interactive key exchange protocols which support an unbounded number of parties and have a security proof that does not rely on knowledge assumptions. Our non-interactive keyexchange protocol does not require a trusted setup and extends easily to the identity-based setting. Our protocols suffer only a polynomial loss to the underlying hardness assumptions.
CITATION STYLE
Khurana, D., Rao, V., & Sahai, A. (2015). Multi-party key exchange for unbounded parties from indistinguishability obfuscation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9452, pp. 52–75). Springer Verlag. https://doi.org/10.1007/978-3-662-48797-6_3
Mendeley helps you to discover research relevant for your work.