Abstract
Identity-based non-interactive key distribution (ID-NIKD) is a cryptographic primitive that enables two users to establish a common secret key without exchanging messages. All users of the system have access to public system parameters and a private key, obtained through the help of a trusted key generation center. In this contribution, we discuss how to capture an intuitive form of forward security for ID-NIKD schemes in a security model. Building on results of Sakai et al. as well as of Paterson and Srinivasan, we discuss how the proposed notion of forward security can be achieved in the random oracle model, using a Bilinear Diffie-Hellman assumption in combination with a forward-secure pseudorandom bit generator. We also show how a forward-secure ID-NIKD scheme can be used to realize forward-secure identity-based encryption.
Similar content being viewed by others
References
Bellare M., Miner S.K.: A forward-secure digital signature scheme. In: Wiener M. (ed.) Advances in Cryptology—CRYPTO ’99, Lecture Notes in Computer Science, vol. 1666, pp. 431–448. Springer-Verlag, Berlin (1999).
Bellare M., Yee B.: Forward-security in private-key cryptography. In: Joye M. (ed.) Topics in Cryptology—CT-RSA 2003, The Cryptographers’ Track at the RSA Conference 2003, Lecture Notes in Computer Science, vol. 2612, pp. 1–18. Springer-Verlag, Berlin (2003).
Blom R.: Non-public key distribution. In: Chaum D., Rivest R., Sherman A. (eds.) Advances in Cryptology—CRYPTO ’82, pp. 231–236. Plenum Press, New York (1983).
Dupont R., Enge A.: Provably secure non-interactive key distribution based on pairings. Discret. Appl. Math. 154(2), 270–276 (2006)
Matsumoto T., Imai H.: On the key predistribution system: a practical solution to the key distribution problem. In: Pomerance C. (eds.) Advances in Cryptology—CRYPTO ’87, Lecture Notes in Computer Science, vol. 293, pp. 185–193. Springer-Verlag, Berlin (1988).
Maurer U.M., Yacobi Y.: Non-interactive public-key cryptography. In: Davies D. (eds.) Advances in Cryptology—EUROCRYPT ’91, Lecture Notes in Computer Science, vol. 547, pp. 498–507. Springer-Verlag, Berlin (1991).
Maurer U.M., Yacobi Y.: A remark on a non-interactive public-key distribution system. In: Rueppel R. (eds.) Advances in Cryptology—EUROCRYPT ’92, Lecture Notes in Computer Science, vol. 658, pp. 458–460. Springer-Verlag, Berlin (1993).
Paterson K.G., Srinivasan S.: On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Des. Codes Cryptogr. 52, 219–241 (2009)
Sakai R., Ohgishi K., Kasahara M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, Fukuoka, Japan, pp. 26–28 (2000).
Steinwandt R., Suárez Corona A.: Identity-based non-interactive key distribution with forward security. In: Proceedings of the 11th Spanish Conference on Cryptology and Information Security RECSI 2010 (2010).
Tsujii S., Kurosawa K., Itoh T.: New noninteractive identity-based key distribution system. Electron. Lett. 24(22), 1356–1357 (1988)
Author information
Authors and Affiliations
Corresponding author
Additional information
This is one of several papers published together in Designs, Codes and Cryptography on the special topic: “Geometry, Combinatorial Designs & Cryptology”.
Rights and permissions
About this article
Cite this article
Steinwandt, R., Suárez Corona, A. Identity-based non-interactive key distribution with forward security. Des. Codes Cryptogr. 64, 195–208 (2012). https://doi.org/10.1007/s10623-011-9486-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-011-9486-0