Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key

被引:0
|
作者
Liu, Yamin [1 ]
Li, Bao [1 ]
Lu, Xianhui [1 ]
Jia, Dingding [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY | 2011年 / 6812卷
关键词
computational Diffie-Hellman; twin Diffie-Hellman; key encapsulation mechanism; standard model; COMPUTATIONAL DIFFIE-HELLMAN; ENCRYPTION; ATTACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we construct an efficient CCA-secure key encapsulation scheme in the standard model. The new scheme is based on the computational Diffie-Hellman assumption and the twinning technique; which has been widely discussed in recent years. Compared with previous schemes of the same kind, the new scheme is more generic, and offers a simple approach for reconciling ciphertext length and key size by altering a parameter. Choosing a reasonable value for the parameter, a balance between the ciphertext length and key size could be achieved.
引用
收藏
页码:310 / 318
页数:9
相关论文
共 50 条
  • [1] Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 132 - 143
  • [2] CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
    Bos, Joppe
    Ducas, Leo
    Kiltz, Eike
    Lepoint, Tancrede
    Lyubashevsky, Vadim
    Schanck, John M.
    Schwabe, Peter
    Seiler, Gregor
    Stehle, Damien
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 353 - 367
  • [3] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554
  • [4] CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution
    Sun, Yinxia
    Zhang, Futai
    Fu, Anmin
    Xia, Zhe
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020, 31 (02) : 175 - 191
  • [5] Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM
    Li, Ziyi
    Lu, Xianhui
    Cheng, Yao
    Li, Bao
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 403 - 406
  • [6] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Shuai Han
    Shengli Liu
    Baodong Qin
    Dawu Gu
    Designs, Codes and Cryptography, 2018, 86 : 517 - 554
  • [7] Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
    Yamakawa, Takashi
    Yamada, Shota
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Kunihiro, Noboru
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 100 - 109
  • [8] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
    Sun, Yinxia
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    IEEE ACCESS, 2018, 6 : 56977 - 56983
  • [9] Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
    Anada, Hiroaki
    Arita, Seiko
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 423 - 428
  • [10] Direct CCA-Secure KEM and Deterministic PKE from Plain LWE
    Boyen, Xavier
    Li, Qinyi
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 116 - 130