Compact public key encryption without full random oracles

被引:0
作者
Yoneyama, Kazuki [1 ]
Hanaoka, Goichiro [2 ]
机构
[1] Ibaraki Univ, 4-12-1 Nakanarusawa Cho, Hitachi, Ibaraki, Japan
[2] Natl Inst Adv Ind Sci & Technol, Koto Ku, 2-4-7 Aomi, Tokyo, Japan
关键词
Random oracle; Observability; Public key encryption; Chosen ciphertext security; Ciphertext overhead; COMPUTATIONAL DIFFIE-HELLMAN; SECURE; ENCAPSULATION; CRYPTOSYSTEM; SCHEMES;
D O I
10.1016/j.pmcj.2016.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving shorter ciphertext length under weaker assumptions in chosen-ciphertext (CCA) secure public-key encryption (PKE) is one of the most important research topics in cryptography. However, it is also known that it is hard to construct a CCA-secure PKE whose ciphertext overhead is less than two group elements in the underlying prime-order group under non-interactive assumptions. A naive approach for achieving more compactness than the above bound is to use random oracles (ROs), but the full RO has various ideal properties like programmability. In this paper, we pursue how to achieve compact PKE only with a minimum ideal property of ROs. Specifically, only with observability, we can give three CCA-secure PKE schemes whose ciphertext overhead is less than two group elements. Our schemes are provably secure under standard assumptions such as the CDH and DDH assumptions. This study shows that ideal properties other than observability are not necessary to construct compact PKE beyond the bound. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:286 / 299
页数:14
相关论文
共 35 条
  • [1] Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
  • [2] Abe M, 2009, LECT NOTES COMPUT SC, V5443, P377
  • [3] Abe M, 2008, LECT NOTES COMPUT SC, V5350, P355, DOI 10.1007/978-3-540-89255-7_22
  • [4] Ananth P, 2013, LECT NOTES COMPUT SC, V8209, P86, DOI 10.1007/978-3-642-41227-1_5
  • [5] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [6] [Anonymous], PIPPENGERS EXPONENTI
  • [7] Bellare M., 1994, P EUROCRYPT, P92, DOI DOI 10.1007/BFB0053428
  • [8] Bellare M, 2013, LECT NOTES COMPUT SC, V8043, P398, DOI 10.1007/978-3-642-40084-1_23
  • [9] Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
  • [10] Boyen X, 2007, LECT NOTES COMPUT SC, V4833, P485