2020
DOI: 10.1109/access.2020.2964038
|View full text |Cite
|
Sign up to set email alerts
|

Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange

Abstract: Multi-Party Non-Interactive Key Exchange (MP-NIKE) is a fundamental cryptographic primitive in which users register into a key generation centre and receive a public/private key pair each. After that, any subset of these users can compute a shared key without any interaction. Nowadays, IoT devices suffer from a high number and large size of messages exchanged in the Key Management Protocol (KMP). To overcome this, an MP-NIKE scheme can eliminate the airtime and latency of messages transferred between IoT devic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 61 publications
0
10
0
Order By: Relevance
“…An MP-NIKE scheme without key generation algorithm run by TTP is proposed in Section 5. In Section 6, the MP-NIKE scheme of [1] is converted to an ID-Based scheme. The security of the proposed multilinear map is proved in Section 7, and finally, the paper is concluded in Section 2.…”
Section: Paper Organizationmentioning
confidence: 99%
See 4 more Smart Citations
“…An MP-NIKE scheme without key generation algorithm run by TTP is proposed in Section 5. In Section 6, the MP-NIKE scheme of [1] is converted to an ID-Based scheme. The security of the proposed multilinear map is proved in Section 7, and finally, the paper is concluded in Section 2.…”
Section: Paper Organizationmentioning
confidence: 99%
“…In ID-based cryptography, the public key of users is obtained directly from the identity of users. Fortunately, in the MP-NIKE scheme of [1] any logN -bit random integer r can be a valid public key and the KGC has a trapdoor to compute its respective private key, while others cannot do it. The TTP can use algorithm ID-KeyGen(SP, ID i ) to compute the private key of user i.…”
Section: Id-based Mp-nikementioning
confidence: 99%
See 3 more Smart Citations