Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key

被引:0
作者
Liu, Yamin [1 ]
Li, Bao [1 ]
Lu, Xianhui [1 ]
Jia, Dingding [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY | 2011年 / 6812卷
关键词
computational Diffie-Hellman; twin Diffie-Hellman; key encapsulation mechanism; standard model; COMPUTATIONAL DIFFIE-HELLMAN; ENCRYPTION; ATTACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we construct an efficient CCA-secure key encapsulation scheme in the standard model. The new scheme is based on the computational Diffie-Hellman assumption and the twinning technique; which has been widely discussed in recent years. Compared with previous schemes of the same kind, the new scheme is more generic, and offers a simple approach for reconciling ciphertext length and key size by altering a parameter. Choosing a reasonable value for the parameter, a balance between the ciphertext length and key size could be achieved.
引用
收藏
页码:310 / 318
页数:9
相关论文
共 42 条
[11]   Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption [J].
Renteria-Mejia, Claudia P. ;
Velasco-Medina, Jaime .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) :2331-2344
[12]   Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices [J].
Yang, Xiaopeng ;
Ma, Wenping ;
Zhang, Chengli .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (05) :866-883
[13]   Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism [J].
Long, Yu ;
Chen, Kefei .
INFORMATION SCIENCES, 2010, 180 (07) :1167-1181
[14]   A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme [J].
Li, Jiguo ;
Teng, Meilin ;
Zhang, Yichen ;
Yu, Qihong .
COMPUTER JOURNAL, 2016, 59 (07) :1066-1075
[15]   CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions [J].
Lin, Shen ;
Li, Yu ;
Chen, Jie .
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 :253-273
[16]   Efficient chosen ciphertext secure public-key encryption under factoring assumption [J].
Qin, Baodong ;
Liu, Shengli .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) :351-360
[17]   More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles [J].
Wang, Hongbing ;
Cao, Zhenfu .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) :173-181
[18]   CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions [J].
Tomita, Toi ;
Ogata, Wakaha ;
Kurosawa, Kaoru .
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019, 2019, 11689 :3-22
[19]   Generic side-channel attacks on cca-secure lattice-based pke and kems [J].
Ravi P. ;
Roy S.S. ;
Chattopadhyay A. ;
Bhasin S. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03) :307-335