Threshold public key cryptosystem for encrypting long messages

被引:0
|
作者
Yang, Guang [1 ]
Liu, Jiqiang [1 ]
机构
[1] Computer and Information Technology Department, Beijing Jiaotong University, Beijing
来源
Journal of Computational Information Systems | 2015年 / 11卷 / 02期
基金
中国国家自然科学基金;
关键词
Computational Diffie-Hellman problem; Long messages; Semantic security; Threshold cryptosystem;
D O I
10.12733/jcis13082
中图分类号
学科分类号
摘要
In this paper, we give two schemes of threshold public key cryptosystem for encrypting long messages. Both of our cryptosystems are highly efficient: for each participant, the first scheme in semi-honest model only needs a modular exponentiation operation and the second scheme needs three modular exponentiation operations. Furthermore, we give a variant of definition of semantic security for encrypting long messages to show that our cryptosystem is semantically secure if the CDH assumption holds. 1553-9105/Copyright © 2015 Binary Information Press
引用
收藏
页码:671 / 681
页数:10
相关论文
共 43 条
  • [1] AN IDENTITY-BASED CRYPTOSYSTEM FOR ENCRYPTING LONG MESSAGES
    Liu, Jiqiang
    Zhong, Sheng
    Han, Lei
    Yao, Haifan
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (06): : 3295 - 3301
  • [2] A public-key threshold cryptosystem based on residue rings
    Deacon, Stephanie
    Duenez, Eduardo
    Iovino, Jose
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (04) : 559 - 571
  • [3] A Cryptosystem for Encryption and Decryption of Long Confidential Messages
    Giri, Debasis
    Barua, Prithayan
    Srivastava, P. D.
    Jana, Biswapati
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 86 - +
  • [4] Two dimensional ElGamal public key cryptosystem
    Karima, Djebaili
    Lamine, Melkemi
    INFORMATION SECURITY JOURNAL, 2019, 28 (4-5): : 120 - 126
  • [5] Semantically secure McEliece public-key cryptosystem
    Kobara, K
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 74 - 83
  • [6] Message transmission for GH-public key cryptosystem
    Ashraf, Muhammad
    Kirlar, Baris Bulent
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 578 - 585
  • [7] A practical public key cryptosystem from Paillier and Rabin schemes
    Galindo, D
    Martín, S
    Morillo, P
    Villar, JL
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 279 - 291
  • [8] A SEMANTICALLY SECURE PUBLIC-KEY CRYPTOSYSTEM BASED ON RSA
    Romankov, V. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2015, 29 (03): : 32 - 40
  • [9] An efficient public key cryptosystem with a privacy enhanced double decryption mechanism
    Youn, TY
    Park, YH
    Kim, CH
    Lim, J
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 144 - 158
  • [10] An efficient public key cryptosystem secure against chosen ciphertext attack
    Ghodosi, Hossein
    Information Systems Security, Proceedings, 2006, 4332 : 303 - 314