Chosen-ciphertext attack secure public key encryption with auxiliary inputs

被引:2
|
作者
Zhang, Zongyang [1 ]
Cao, Zhenfu [1 ]
Qian, Haifeng [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
public key encryption; chosen-ciphertext attacks; auxiliary input; Naor-Yung paradigm; RESILIENT; CRYPTOGRAPHY; SCHEMES;
D O I
10.1002/sec.504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the NaorYung double encryption paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1404 / 1411
页数:8
相关论文
共 50 条
  • [31] New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service
    Wang, Xu An
    Ma, Jianfeng
    Xhafa, Fatos
    Qin, Baodong
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2017, 13 (03) : 246 - 269
  • [32] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105
  • [33] On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack
    Chang, Jinyong
    Xue, Rui
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (11) : 2267 - 2271
  • [34] Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud
    Wang, Zhiwei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 770 - 776
  • [35] Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks
    Yuen, Tsz Hon
    Zhang, Ye
    Yiu, Siu Ming
    Liu, Joseph K.
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 130 - 147
  • [36] Chosen ciphertext attacks on lattice-based public key encryption and modem (non-quantum) cryptography in a quantum environment
    Izmerly, Oleg
    Mor, Tal
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (03) : 308 - 323
  • [37] Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions
    Chang, Jinyong
    Xue, Rui
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1525 - 1536
  • [38] Public- key encryption scheme with selective opening chosen- ciphertext security based on the Decisional Diffie- Hellman assumption
    Liu, Shengli
    Zhang, Fangguo
    Chen, Kefei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (08) : 1506 - 1519
  • [39] Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices
    Yang, Xiaopeng
    Ma, Wenping
    Zhang, Chengli
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (05) : 866 - 883
  • [40] Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices
    Mao, Yaojun
    Fu, Xingbing
    Guo, Chen
    Wu, Guohua
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11)