Multi-Divisible On-Line/Off-Line Encryptions

被引:1
作者
Yamamoto, Dan [1 ,2 ]
Ogata, Wakaha [2 ]
机构
[1] Hitachi Ltd, Yokohama, Kanagawa 2440817, Japan
[2] Tokyo Inst Technol, Tokyo 1528552, Japan
关键词
public-key encryption; on-line/off-line encryption; divisible; multi-user setting; KEM; CHOSEN-CIPHERTEXT SECURITY; HYBRID ENCRYPTION;
D O I
10.1587/transfun.E100.A.91
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new notion of public-key encryption, called multi-divisible on-line/off-line encryptions, in which partial ciphertexts can be computed and made publicly available for the recipients before the recipients' public key and/or the plaintexts are determined. We formalize its syntax and define several security notions with regard to the level of divisibility, the number of users, and the number of encryption (challenge) queries per user. Furthermore, we show implications and separations between these security notions and classify them into three categories. We also present concrete multi-divisible on-line/off-line encryption schemes. The schemes allow the computationally-restricted and/or bandwidth-restricted devices to transmit ciphertexts with low computational overhead and/or low-bandwidth network.
引用
收藏
页码:91 / 102
页数:12
相关论文
共 26 条
[1]   Efficient hybrid encryption from ID-based encryption [J].
Abe, Masayuki ;
Cui, Yang ;
Imai, Hideki ;
Kiltz, Eike .
DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (03) :205-240
[2]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[3]   Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? [J].
Bellare, Mihir ;
Hofheinz, Dennis ;
Kiltz, Eike .
JOURNAL OF CRYPTOLOGY, 2015, 28 (01) :29-48
[4]   Chosen-ciphertext security from identity-based encryption [J].
Boneh, Dan ;
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
SIAM JOURNAL ON COMPUTING, 2006, 36 (05) :1301-1328
[5]  
Boyen X., 2005, 2005288 CRYPT EPRINT
[6]  
Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
[7]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[8]  
Catalano D, 2008, LECT NOTES COMPUT SC, V4939, P101
[9]  
Chow SS, 2011, P 6 ACM S INF COMP C, P52, DOI DOI 10.1145/1966913.1966922
[10]  
EVEN S, 1990, LECT NOTES COMPUT SC, V435, P263