Skip to main content
Log in

Identity-based non-interactive key distribution with forward security

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Identity-based non-interactive key distribution (ID-NIKD) is a cryptographic primitive that enables two users to establish a common secret key without exchanging messages. All users of the system have access to public system parameters and a private key, obtained through the help of a trusted key generation center. In this contribution, we discuss how to capture an intuitive form of forward security for ID-NIKD schemes in a security model. Building on results of Sakai et al. as well as of Paterson and Srinivasan, we discuss how the proposed notion of forward security can be achieved in the random oracle model, using a Bilinear Diffie-Hellman assumption in combination with a forward-secure pseudorandom bit generator. We also show how a forward-secure ID-NIKD scheme can be used to realize forward-secure identity-based encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bellare M., Miner S.K.: A forward-secure digital signature scheme. In: Wiener M. (ed.) Advances in Cryptology—CRYPTO ’99, Lecture Notes in Computer Science, vol. 1666, pp. 431–448. Springer-Verlag, Berlin (1999).

  2. Bellare M., Yee B.: Forward-security in private-key cryptography. In: Joye M. (ed.) Topics in Cryptology—CT-RSA 2003, The Cryptographers’ Track at the RSA Conference 2003, Lecture Notes in Computer Science, vol. 2612, pp. 1–18. Springer-Verlag, Berlin (2003).

  3. Blom R.: Non-public key distribution. In: Chaum D., Rivest R., Sherman A. (eds.) Advances in Cryptology—CRYPTO ’82, pp. 231–236. Plenum Press, New York (1983).

  4. Dupont R., Enge A.: Provably secure non-interactive key distribution based on pairings. Discret. Appl. Math. 154(2), 270–276 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  5. Matsumoto T., Imai H.: On the key predistribution system: a practical solution to the key distribution problem. In: Pomerance C. (eds.) Advances in Cryptology—CRYPTO ’87, Lecture Notes in Computer Science, vol. 293, pp. 185–193. Springer-Verlag, Berlin (1988).

  6. Maurer U.M., Yacobi Y.: Non-interactive public-key cryptography. In: Davies D. (eds.) Advances in Cryptology—EUROCRYPT ’91, Lecture Notes in Computer Science, vol. 547, pp. 498–507. Springer-Verlag, Berlin (1991).

  7. Maurer U.M., Yacobi Y.: A remark on a non-interactive public-key distribution system. In: Rueppel R. (eds.) Advances in Cryptology—EUROCRYPT ’92, Lecture Notes in Computer Science, vol. 658, pp. 458–460. Springer-Verlag, Berlin (1993).

  8. Paterson K.G., Srinivasan S.: On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Des. Codes Cryptogr. 52, 219–241 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  9. Sakai R., Ohgishi K., Kasahara M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, Fukuoka, Japan, pp. 26–28 (2000).

  10. Steinwandt R., Suárez Corona A.: Identity-based non-interactive key distribution with forward security. In: Proceedings of the 11th Spanish Conference on Cryptology and Information Security RECSI 2010 (2010).

  11. Tsujii S., Kurosawa K., Itoh T.: New noninteractive identity-based key distribution system. Electron. Lett. 24(22), 1356–1357 (1988)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rainer Steinwandt.

Additional information

This is one of several papers published together in Designs, Codes and Cryptography on the special topic: “Geometry, Combinatorial Designs & Cryptology”.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Steinwandt, R., Suárez Corona, A. Identity-based non-interactive key distribution with forward security. Des. Codes Cryptogr. 64, 195–208 (2012). https://doi.org/10.1007/s10623-011-9486-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-011-9486-0

Keywords

Mathematics Subject Classification (2000)

Navigation