New key encapsulation mechanism scheme with provable security in the standard model

被引:0
作者
Wang, Zecheng [1 ]
Wang, Xiu [1 ]
机构
[1] School of Management Science and Engineering, Anhui University of Finance and Economics, Bengbu
来源
Journal of Information and Computational Science | 2013年 / 10卷 / 08期
关键词
Adaptively chosen ciphertext attack; D-DDH problem; Key Encapsulation mechanism; Provable security; Standard model;
D O I
10.12733/jics20101757
中图分类号
学科分类号
摘要
Based on a newly introduced intractable problem named d-decisional Diffie-Hellman (d-DDH) problem, a new Key Encapsulation Mechanism (KEM) scheme is proposed. The scheme is proved secure against adaptively chosen ciphertext attacks in the standard model under the d-DDH assumption. And it is as efficient as those based on Decisional Diffie-Hellman Problem (DDHP), while it is based on the more hard d-DDH problem. Moreover, one can select different d for different security demand of applications. Compared with the schemes based on computational Diffie-Hellman problem, the efficiency of our scheme has obvious advantage. Copyright © 2013 Binary Information Press.
引用
收藏
页码:2291 / 2301
页数:10
相关论文
共 16 条
  • [1] Rackoff C., Simon D., Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack, Proceedings of the Advances in Cryptology-Crypto 1991, pp. 433-444, (1991)
  • [2] Cramer R., Shoup V., A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Proceedings of the Advances in Cryptology-Crypto 1998, pp. 13-25, (1998)
  • [3] Cramer R., Shoup V., Design and analysis of practical public-key encryption schemes secure against adaptive chosen-ciphertext attack, SIAM J. Comput., 33, pp. 167-226, (2003)
  • [4] Shoup V., Using hash functions as a hedge against chosen ciphertext attack, Proceedings of the Advances in Cryptology-Eurocrypt 2000, pp. 275-288, (2000)
  • [5] Kurosawa K., Desmedt Y., A new paradigm of hybrid encryption scheme, Proceedings of the Advances in Cryptology-Crypto 2004, pp. 426-442, (2004)
  • [6] Abe M., Gennaro R., Kurosawa K., Shoup V., Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM, Proceedings of the Advances in Cryptology-Eurocrypt 2005, pp. 128-146, (2005)
  • [7] Hofheinz D., Kiltz E., Secure hybrid encryption from weakened key encapsulation, Proceedings of the Advances in Cryptology-Crypto 2007, pp. 553-571, (2007)
  • [8] Kiltz E., Chosen-ciphertext security from tag-based encryption, Proceedings of the Theory of Cryptography Conference-TCC 2006, pp. 581-600, (2006)
  • [9] Boyen X., Mei Q., Waters B., Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 320-329, (2005)
  • [10] Cash D., Kiltz E., Shoup V., The twin Diffie-Hellman problem and applications, Proceedings of the Advances in Cryptology-Eurocrypt 2008, pp. 127-145, (2008)