Multi-party key exchange for unbounded parties from indistinguishability obfuscation

N/ACitations
Citations of this article
23Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users, (2) require a trusted setup, or (3) rely on knowledge-type assumptions. We construct the first non-interactive key exchange protocols which support an unbounded number of parties and have a security proof that does not rely on knowledge assumptions. Our non-interactive keyexchange protocol does not require a trusted setup and extends easily to the identity-based setting. Our protocols suffer only a polynomial loss to the underlying hardness assumptions.

Cite

CITATION STYLE

APA

Khurana, D., Rao, V., & Sahai, A. (2015). Multi-party key exchange for unbounded parties from indistinguishability obfuscation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9452, pp. 52–75). Springer Verlag. https://doi.org/10.1007/978-3-662-48797-6_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free