Multi-Party Non-Interactive Key Exchange (MP-NIKE) is a fundamental cryptographic primitive in which users register into a key generation centre and receive a public/private key pair each. After that, any subset of these users can compute a shared key without any interaction. Nowadays, IoT devices suffer from a high number and large size of messages exchanged in the Key Management Protocol (KMP). To overcome this, an MP-NIKE scheme can eliminate the airtime and latency of messages transferred between IoT devices. MP-NIKE schemes can be realized by using multilinear maps. There are several attempts for constructing multilinear maps based on indistinguishable obfuscation, lattices and the Chinese Remainder Theorem (CRT). Nevertheless, these schemes are inefficient in terms of computation cost and memory overhead. Besides, several attacks have been recently reported against CRT-based and lattice-based multilinear maps. There is only one modular exponentiation-based MP-NIKE scheme in the literature which has been claimed to be both secure and efficient. In this article, we present an attack on this scheme based on the Euclidean algorithm, in which two colluding users can obtain the shared key of any arbitrary subgroup of users. We also propose an efficient and secure MP-NIKE scheme. We show how our proposal is secure in the random oracle model assuming the hardness of the root extraction modulo a composite number.
翻译:多党非互动键交换(MP-NIKE)是一个基本的加密原始程序,用户可以在其中注册到关键一代中心,并接收公/私钥匙配对。此后,这些用户的任何子集都可以在没有互动的情况下计算一个共享的密钥。如今,IOT设备在关键管理协议(KMP)中交换的信息数量很多,数量大得多。为解决这一问题,MP-NIKE计划可以消除IOT设备之间传输的信息的空气时间和时间长度。使用多线性地图可以实现 MP-NIKE 计划。有人试图根据不可分解的模糊、拉托特和中国调控点Theorem(CRT)来绘制多线性地图。然而,这些计划在计算成本和记忆管理协议(KMP ) 交换信息方面效率不高。此外,最近还报告了几起针对基于基于 CRTT和 Lattice 的多线性地图的袭击事件。在文献中,我们仅有一个基于模块的以直线性根基的MPK-NIKE计划,声称既安全又高效的多线性多线性多线性绘制多线性多线性多线性图。在安全性和多线性图中可以展示一个安全的多线性多线性图中展示多线性图的多线性图的多线性图。我们目前可以展示一个安全性图中,在这个任意的用户的用户组合组合中展示一个安全性图中,在这个任意式组合中展示一个安全性图中展示一个安全性图。