New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability

被引:0
|
作者
Weng, Zhiwei [1 ]
Weng, Jian [1 ]
He, Kai [1 ]
Li, Yingkai [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou, Guangdong, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE | 2012年 / 6839卷
关键词
Public key encryption; adaptive chosen-ciphertext security; gap hashed Diffie-Hellman assumption; PKE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a new public-key encryption scheme, and prove its adaptive chosen-ciphertext security under the gap hashed Diffie-Hellman assumption in the standard model. Compared with previous public key encryption schemes with adaptive chosen-ciphertext security, our proposed scheme simultaneously enjoys the following advantages: small public key size, short ciphertext, low computational cost, weak complexity assumption and public verifiability.
引用
收藏
页码:170 / 176
页数:7
相关论文
共 50 条
  • [41] An efficient and provably secure public key encryption scheme based on coding theory
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Xiaohui
    Shen, Xuemin
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1440 - 1447
  • [42] Low Noise LPN: Key dependent message secure public key encryption an sample amplification
    Doettling, Nico
    IET INFORMATION SECURITY, 2016, 10 (06) : 372 - 385
  • [43] Lattice-based completely non-malleable public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 293 - 313
  • [44] Flexible Fine-Grained Authorization Public Key Encryption with Equality Test Under Standard Model
    Deng X.
    Qian H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2222 - 2237
  • [45] Lattice-based completely non-malleable public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    Designs, Codes and Cryptography, 2014, 71 : 293 - 313
  • [46] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227
  • [47] CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling
    Sun, Xiaochao
    Li, Bao
    Lu, Xianhui
    Fang, Fuyang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 361 - 378
  • [48] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [49] Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
    Pan, Jiaxin
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 363 - 393
  • [50] Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Joseph K.
    Parampalli, Udaya
    Yuen, Tsz Hon
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 901 - 906