Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption

被引:0
|
作者
Pereira, Mayana [1 ]
Dowsley, Rafael [2 ]
Hanaoka, Goichiro [2 ]
Nascimento, Anderson C. A. [1 ]
机构
[1] Univ Brasilia, Dept Elect Engn, Campus Darcy Ribeiro, BR-70910900 Brasilia, DF, Brazil
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1010021, Japan
来源
INFORMATION SECURITY | 2011年 / 6531卷
关键词
Bounded chosen ciphertext secure public key encryption; computational Diffie-Hellman assumption; COMPUTATIONAL DIFFIE-HELLMAN; ATTACK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In [2] a public key encryption scheme was proposed against adversaries with a bounded number of decryption queries based on the decisional Diffie-Helman Problems. In this paper, we show that the same result can be easily obtained based on weaker computational assumption, namely: the computational Diffie-Helman assumption.
引用
收藏
页码:299 / +
页数:3
相关论文
共 50 条
  • [21] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [22] A survey of IND-CCA secure public-key encryption schemes relative to factoring
    Müller, S
    PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 181 - 196
  • [23] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (01): : 3 - 8
  • [24] Pairing-based public-key encryption schemes with backward-and-forward security
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (04): : 303 - 308
  • [25] Pairing-based public-key encryption schemes with backward-and-forward security
    DEBI Institute, Curtin Business School, Curtin University of Technology, GPO Box U1987, WA 6845, Australia
    Comput Syst Sci Eng, 2008, 1 (3-8):
  • [26] Aleakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei Zhou
    Bo Yang
    Hao Cheng
    Qing-long Wang
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 481 - 493
  • [27] A leakage-resilient certificateless public key encryption scheme with CCA2 security
    Yan-wei ZHOU
    Bo YANG
    Hao CHENG
    Qing-long WANG
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (04) : 481 - 493
  • [28] Aleakage-resilient certificateless public key encryption scheme with CCA2 security
    Zhou, Yan-wei
    Yang, Bo
    Cheng, Hao
    Wang, Qing-long
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (04) : 481 - 493
  • [29] Structure-preserving public-key encryption with leakage-resilient CCA security
    Lyu, Lin
    Liu, Shengli
    Gu, Dawu
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 57 - 80
  • [30] On the security of a Williams based public key encryption scheme
    Mülller, S
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 1 - 18