Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption

被引:0
|
作者
Pereira, Mayana [1 ]
Dowsley, Rafael [2 ]
Hanaoka, Goichiro [2 ]
Nascimento, Anderson C. A. [1 ]
机构
[1] Univ Brasilia, Dept Elect Engn, Campus Darcy Ribeiro, BR-70910900 Brasilia, DF, Brazil
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1010021, Japan
来源
INFORMATION SECURITY | 2011年 / 6531卷
关键词
Bounded chosen ciphertext secure public key encryption; computational Diffie-Hellman assumption; COMPUTATIONAL DIFFIE-HELLMAN; ATTACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In [2] a public key encryption scheme was proposed against adversaries with a bounded number of decryption queries based on the decisional Diffie-Helman Problems. In this paper, we show that the same result can be easily obtained based on weaker computational assumption, namely: the computational Diffie-Helman assumption.
引用
收藏
页码:299 / +
页数:3
相关论文
共 50 条
  • [1] Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
    Dowsley, Rafael (rafael.dowsley@kit.edu), 1600, Oxford University Press (58):
  • [2] Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
    Pereira, Mayana
    Dowsley, Rafael
    Nascimento, Anderson C. A.
    Hanaoka, Goichiro
    COMPUTER JOURNAL, 2015, 58 (10): : 2738 - 2746
  • [3] Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
    Yamakawa, Takashi
    Yamada, Shota
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Kunihiro, Noboru
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 100 - 109
  • [4] Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
    Yamada, Shota
    Kawai, Yutaka
    Hanaoka, Goichiro
    Kunihiro, Noboru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11) : 1984 - 1993
  • [5] Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption
    Hanatani, Yoshikazu
    Muratani, Hirofumi
    Yonemura, Tomoko
    PROVABLE SECURITY, 2011, 6980 : 138 - 153
  • [6] Towards, a separation of semantic and CCA security for public key encryption
    Gertner, Yael
    Malkin, Tal
    Myers, Steven
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 434 - +
  • [7] Public- key encryption scheme with selective opening chosen- ciphertext security based on the Decisional Diffie- Hellman assumption
    Liu, Shengli
    Zhang, Fangguo
    Chen, Kefei
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (08): : 1506 - 1519
  • [8] Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key
    Liu, Yamin
    Li, Bao
    Lu, Xianhui
    Jia, Dingding
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 310 - 318
  • [9] Efficient chosen ciphertext secure public-key encryption under factoring assumption
    Qin, Baodong
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 351 - 360
  • [10] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200