Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key

被引:0
作者
Liu, Yamin [1 ]
Li, Bao [1 ]
Lu, Xianhui [1 ]
Jia, Dingding [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY | 2011年 / 6812卷
关键词
computational Diffie-Hellman; twin Diffie-Hellman; key encapsulation mechanism; standard model; COMPUTATIONAL DIFFIE-HELLMAN; ENCRYPTION; ATTACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we construct an efficient CCA-secure key encapsulation scheme in the standard model. The new scheme is based on the computational Diffie-Hellman assumption and the twinning technique; which has been widely discussed in recent years. Compared with previous schemes of the same kind, the new scheme is more generic, and offers a simple approach for reconciling ciphertext length and key size by altering a parameter. Choosing a reasonable value for the parameter, a balance between the ciphertext length and key size could be achieved.
引用
收藏
页码:310 / 318
页数:9
相关论文
共 43 条
[31]   Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [J].
Seyhan, Kuebra ;
Akleylek, Sedat .
PEERJ COMPUTER SCIENCE, 2023, 9
[32]   Provably secure attribute based signcryption with delegated computation and efficient key updating [J].
Hong, Hanshu ;
Xia, Yunhao ;
Sun, Zhixin ;
Liu, Ximeng .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05) :2646-2659
[33]   Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid [J].
Wang, Yong ;
Chen, Biwen ;
Li, Lei ;
Ma, Qiang ;
Li, Huicong ;
He, Debiao .
IEEE ACCESS, 2020, 8 :40704-40713
[35]   A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication [J].
Han, Kyusuk ;
Yeun, Chan Yeob ;
Shon, Taeshik ;
Park, Jonghyuk ;
Kim, Kwangjo .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) :461-472
[36]   Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks [J].
Lu, Yang ;
Li, Jiguo .
SCIENTIFIC WORLD JOURNAL, 2014,
[37]   Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model [J].
Lu, Yang ;
Li, Jiguo .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (05) :1553-1568
[38]   Deep self-learning based dynamic secret key generation for novel secure and efficient hashing algorithm [J].
Ullah, Fasee ;
Pun, Chi-Man .
INFORMATION SCIENCES, 2023, 629 :488-501
[39]   Secure key distribution based on hybrid chaos synchronization between semiconductor lasers subject to dual injections [J].
Liu, Shiqin ;
Jiang, Ning ;
Zhang, Yiqun ;
Wang, Chao ;
Zhao, Anke ;
Qiu, Kun ;
Zhang, Qianwu .
OPTICS EXPRESS, 2022, 30 (18) :32366-32380
[40]   Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision [J].
Abbasinezhad-Mood, Dariush ;
Mazinani, Sayyed Majid ;
Nikooghadam, Morteza ;
Ostad-Sharif, Arezou .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1227-1238