Chosen-ciphertext attack secure public key encryption with auxiliary inputs

被引:2
|
作者
Zhang, Zongyang [1 ]
Cao, Zhenfu [1 ]
Qian, Haifeng [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
public key encryption; chosen-ciphertext attacks; auxiliary input; Naor-Yung paradigm; RESILIENT; CRYPTOGRAPHY; SCHEMES;
D O I
10.1002/sec.504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the NaorYung double encryption paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1404 / 1411
页数:8
相关论文
共 50 条
  • [21] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434
  • [22] Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
    Benz, Laurin
    Beskorovajnov, Wasilij
    Eilebrecht, Sarai
    Groell, Roland
    Mueller, Maximilian
    Mueller-Quade, Jorn
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 257 - 288
  • [23] Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2020, 809 (809) : 277 - 295
  • [24] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 313 - 332
  • [25] Practical Chosen Ciphertext Secure Encryption from Factoring
    Dennis Hofheinz
    Eike Kiltz
    Victor Shoup
    Journal of Cryptology, 2013, 26 : 102 - 118
  • [26] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    Shoup, Victor
    JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 102 - 118
  • [27] Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited
    Mei, Qixiang
    Li, Bao
    Lu, Xianhui
    Jia, Dingding
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 210 - 227
  • [28] New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
    Park, Jong Hwan
    Lee, Kwangsu
    Lee, Dong Hoon
    INFORMATION SCIENCES, 2015, 325 : 256 - 270
  • [29] Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
    Azouaoui M.
    Kuzovkova Y.
    Schneider T.
    van Vredendaal C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 372 - 396
  • [30] Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
    Pal, Tapas
    Dutta, Ratna
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 24 - 45