Abstract
We describe HIMMO, a new scheme for identity-based symmetric key generation. Like the scheme of Blundo et al, HIMMO employs symmetric polynomials, which lead to very efficient implementations, but it is much less vulnerable against collusion attacks. HIMMO employs mixing modular operations over different rings and hiding part of the result of polynomial evaluation by only considering its least significant bits. We discuss the collusion resistance properties of HIMMO based on lattice-based cryptanalysis and provide figures on speed and memory usage of an implementation for various system parameters. • C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. ”Perfectlysecure key distribution for dynamic conferences”. In E.F. Brickell, editor, CRYPTO ’92, volume 740 of Lecture Notes in Computer Science, pp. 471-486. Springer, 1992. • O. Garcia-Morchon, R. Rietman, L. Tolhuizen, D. Gomez Perez, J. Gutierrez, S. Merino del Pozo. ”An ultra-lightweight ID-based pairiwse key establishment scheme aiming at full collusion resistance”. IACR Cryptology ePrint Archive, Vol 2012, p.618, 2012.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.