New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability

被引:0
|
作者
Weng, Zhiwei [1 ]
Weng, Jian [1 ]
He, Kai [1 ]
Li, Yingkai [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou, Guangdong, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE | 2012年 / 6839卷
关键词
Public key encryption; adaptive chosen-ciphertext security; gap hashed Diffie-Hellman assumption; PKE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a new public-key encryption scheme, and prove its adaptive chosen-ciphertext security under the gap hashed Diffie-Hellman assumption in the standard model. Compared with previous public key encryption schemes with adaptive chosen-ciphertext security, our proposed scheme simultaneously enjoys the following advantages: small public key size, short ciphertext, low computational cost, weak complexity assumption and public verifiability.
引用
收藏
页码:170 / 176
页数:7
相关论文
共 50 条
  • [31] Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
    Sakai, Yusuke
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 165 - 172
  • [32] Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions
    Ananth Raghunathan
    Gil Segev
    Salil Vadhan
    Journal of Cryptology, 2018, 31 : 1012 - 1063
  • [33] Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions
    Raghunathan, Ananth
    Segev, Gil
    Vadhan, Salil
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 1012 - 1063
  • [34] A New Public Key Encryption with Equality Test
    Huang, Kaibin
    Tso, Raylin
    Chen, Yu-Chi
    Li, Wangyu
    Sun, Hung-Min
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 550 - 557
  • [35] A Provably Secure Public Key Encryption Scheme Based on Isogeny Star
    Han, Weiwei
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 623 - 627
  • [36] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105
  • [37] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [38] Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
    Wang, Huige
    Chen, Kefei
    Liu, Joseph K.
    Hu, Ziyuan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 119 - 140
  • [39] Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    THEORETICAL COMPUTER SCIENCE, 2012, 462 : 39 - 58
  • [40] Permutation polynomials and a new public-key encryption
    Khachatrian, Gurgen
    Kyureghyan, Melsik
    DISCRETE APPLIED MATHEMATICS, 2017, 216 : 622 - 626