Tight chosen ciphertext attack(CCA)-secure hybrid encryption scheme with full public verifiability

被引:0
作者
KANG Li [1 ,2 ]
TANG XiaoHu [3 ]
LIU JiaFen [1 ]
机构
[1] School of Economic Information Engineering, Southwestern University of Finance and Economics
[2] Research Center for Payment Systems of China, Southwestern University of Finance and Economics
[3] Information Security and National Computing Grid Lab, Southwest Jiaotong University
关键词
public-key encryption(PKE); hybrid PKE; public verifiability; passive attack(PA) security; chosen ciphertext attack(CCA) security; decisional bilinear Diffie–Hellman;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
In this paper, we propose a new "full public verifiability" concept for hybrid public-key encryption schemes. We also present a new hybrid public-key encryption scheme that has this feature, which is based on the decisional bilinear Diffie–Hellman assumption. We have proven that the new hybrid public-key encryption scheme is secure against adaptive chosen ciphertext attack in the standard model. The "full public verifiability"feature means that the new scheme has a shorter ciphertext and reduces the security requirements of the symmetric encryption scheme. Therefore, our new scheme does not need any message authentication code, even when the one-time symmetric encryption scheme is passive attacks secure. Compared with all existing publickey encryption schemes that are secure to the adaptive chosen ciphertext attack, our new scheme has a shorter ciphertext, efficient tight security reduction, and fewer requirements(if the symmetric encryption scheme can resist passive attacks).
引用
收藏
页码:162 / 175
页数:14
相关论文
共 21 条
[1]  
Chosen-ciphertext security from identity-based encryption. Dan Boneh,Ran Canetti,Shai Halevi,Jonathan Katz. SIAM Journal on Computing . 2006
[2]  
Efficient identity-based encryption without random oracles. Waters B. Proceeding of Advances in Cryptology-Eurocrypt’2005 . 2005
[3]  
Secure identity based encryption without random oracles. Dan Boneh,Xavier Boyen. Proceedings of Advances in Cryptology-Crypto’2004 . 2004
[4]  
Identity-based cryptosystems and signature schemes. Shamir A. Advances in Cryptology - CRYPTO’84 . 1984
[5]  
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Cramer R,Shoup V. Advances in Cryptology-Crypto’98 . 1998
[6]   Lecture Notes in Computer Science [C]. 
The First International Conference on Web-Age Information Management
,1600
[7]  
Recommendation for Key Management,Part 1:General.Revision 3. Special Publication (SP)800-57 . 2012
[8]  
Secure hash standard. NIST FIPS 180-4 . 2012
[9]  
Handbook of mathematical tables and formulas. Burington R S,Lange N A. . 1965
[10]   Lecture Notes in Computer Science [C]. 
The First International Conference on Web-Age Information Management
,1600