Chosen-ciphertext attack secure public key encryption with auxiliary inputs

被引:2
|
作者
Zhang, Zongyang [1 ]
Cao, Zhenfu [1 ]
Qian, Haifeng [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
public key encryption; chosen-ciphertext attacks; auxiliary input; Naor-Yung paradigm; RESILIENT; CRYPTOGRAPHY; SCHEMES;
D O I
10.1002/sec.504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the NaorYung double encryption paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1404 / 1411
页数:8
相关论文
共 50 条
  • [1] Improved public key encryption scheme secure against adaptive chosen-ciphertext attacks
    Chen, Min-Rong
    Zhang, Xi
    He, Kai
    Guan, Chao-Wen
    Liu, Dan
    Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (06): : 1149 - 1154
  • [2] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Yvo Desmedt
    Rosario Gennaro
    Kaoru Kurosawa
    Victor Shoup
    Journal of Cryptology, 2010, 23 : 91 - 120
  • [3] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Desmedt, Yvo
    Gennaro, Rosario
    Kurosawa, Kaoru
    Shoup, Victor
    JOURNAL OF CRYPTOLOGY, 2010, 23 (01) : 91 - 120
  • [4] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [5] The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
    Choi, Seung Geol
    Herranz, Javier
    Hofheinz, Dennis
    Hwang, Jung Yeon
    Kiltz, Eike
    Lee, Dong Hoon
    Yung, Moti
    INFORMATION PROCESSING LETTERS, 2009, 109 (16) : 897 - 901
  • [6] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +
  • [7] Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    Cramer, R
    Shoup, V
    SIAM JOURNAL ON COMPUTING, 2003, 33 (01) : 167 - 226
  • [8] Concrete chosen-ciphertext secure encryption from subgroup membership problems
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 1 - +
  • [9] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176
  • [10] Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
    Wang, Huige
    Chen, Kefei
    Liu, Joseph K.
    Hu, Ziyuan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 119 - 140