A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol

被引:1
作者
Isobe, Shuji [1 ]
Iwazaki, Jun-ya [2 ]
Koizumi, Eisuke [1 ]
Suda, Atsushi [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, 41 Kawauchi, Sendai, Miyagi 9808576, Japan
[2] Tohoku Univ, Sch Med, 2-1 Seiryo Machi, Sendai, Miyagi 9808575, Japan
来源
2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018) | 2018年
关键词
FACTORIZATION; CRYPTOSYSTEM; SECURE;
D O I
10.1109/CANDARW.2018.00082
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a secure encryption protocol on nonabelian groups. We follow the line of the construction of the Cramer-Shoup encryption protocol, which is proved to be indistinguishable against adaptive chosen ciphertext attack (INDCCA, for short) by refining the ElGamal encryption protocol. In our protocol, the Anshel-Anshel-Goldfeld key exchange protocol plays the role of the Diffie-Hellman key exchange protocol in the Cramer-Shoup protocol. We then prove that the proposed protocol is indistinguishable against adaptive chosen ciphertext attacks in a slightly restricted sense, what we call the IND-rCCA security. The security notion of IND-rCCA is weaker than that of IND-CCA in a sense that the adversary's query is somewhat restricted in the security game.
引用
收藏
页码:410 / 416
页数:7
相关论文
共 18 条
[1]  
Anshel I, 2001, LECT NOTES COMPUT SC, V2020, P13
[2]  
Anshel I, 1999, MATH RES LETT, V6, P287
[3]  
Baba S., 2011, IACR CRYPTOLOGY EPRI, V2011, P48
[4]   Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J].
Cramer, R ;
Shoup, V .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :167-226
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[7]  
Fujisaki E, 1999, LECT NOTES COMPUT SC, V1560, P53
[8]   New public key cryptosystems based on non-Abelian factorization problems [J].
Gu, Lize ;
Wang, Licheng ;
Ota, Kaoru ;
Dong, Mianxiong ;
Cao, Zhenfu ;
Yang, Yixian .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) :912-922
[9]   Noncommutative Lightweight Signcryption for Wireless Sensor Networks [J].
Gu, Lize ;
Pan, Yun ;
Dong, Mianxiong ;
Ota, Kaoru .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[10]  
Koo K. H., 2000, LNCS, V1880, P166