Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model

被引:1
|
作者
Sakai, Yusuke [1 ]
Hanaoka, Goichiro [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
关键词
public-key encryption; chosen-ciphertext security; tight security; IBE;
D O I
10.1587/transfun.2019CIP0020
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Chosen-ciphertext security is a central goal in designing a secure public-key encryption scheme, and it is also important that the chosen-ciphertext security is tightly reduced to some well-established hard problem. Moreover, it is more important to have a tight reduction in the multi-user multi-challenge setting, since a tight security reduction in the single-user single-challenge setting generally does not imply a tight reduction to the multi-user multi-challenge setting. We propose the first fully tightly secure and practical public-key encryption scheme which is chosen-ciphertext secure in the multi-user multi-challenge setting in the random oracle model. The scheme is proven secure under the decisional Diffie-Hellman assumption in a pairing-free group. The ciphertext overhead of our scheme is two group elements and two exponents.
引用
收藏
页码:165 / 172
页数:8
相关论文
共 50 条
  • [1] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105
  • [2] Tightly secure signatures and public-key encryption
    Dennis Hofheinz
    Tibor Jager
    Designs, Codes and Cryptography, 2016, 80 : 29 - 61
  • [3] Tightly secure signatures and public-key encryption
    Hofheinz, Dennis
    Jager, Tibor
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (01) : 29 - 61
  • [4] Tightly Secure Signatures and Public-Key Encryption
    Hofheinz, Dennis
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 590 - 607
  • [5] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [6] Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
    Pan, Jiaxin
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 363 - 393
  • [7] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [8] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [9] Public Key Encryption without Random Oracle Made Truly Practical
    Wei, Puwen
    Wang, Xiaoyun
    Zheng, Yuliang
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 107 - +
  • [10] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455