Efficient leakage-resilient public key encryption from DDH assumption

被引:0
作者
Sujuan Li
Futai Zhang
Yinxia Sun
Limin Shen
机构
[1] Nanjing Normal University,
[2] Nanjing University of Technology,undefined
来源
Cluster Computing | 2013年 / 16卷
关键词
Decisional Diffie-Hellman assumption; Adaptive posteriori chosen ciphertext attack; Leakage resilient; Cramer-Shoup encryption; Key leakage; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
For an encryption scheme to be applied in practical applications, it should withstand various leakage attacks. In this paper, we present a new leakage-resilient public key encryption scheme whose security is based on the classical DDH (decisional Diffie-Hellman) assumption. In the computational cost, our proposed scheme is more efficient than the original Cramer-Shoup leakage-resilient public key encryption scheme. At the same time, our new scheme also enjoys a shorter (public and secret) key length, and a higher relative key leakage ratio. We formally prove our new proposal is semantically secure against adaptive posteriori chosen ciphertext key-leakage attacks assuming the hardness of the DDH problem without random models.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 17 条
  • [1] Avanzi R.M.(2005)The complexity of certain multi-exponentiation techniques in cryptography J. Cryptol. 18 357-373
  • [2] Carter J.L.(1979)Universal classes of hash functions J. Comput. Syst. Sci. 18 143-154
  • [3] Wegman M.N.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
  • [4] Cramer R.(2000)Complexity and fast algorithms for multiexponentiations IEEE Trans. Comput. 49 141-147
  • [5] Shoup V.(2008)Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM J. Comput. 38 97-139
  • [6] Dimitrov V.S.(1998)A survey of fast exponentiation methods J. Algorithms 27 129-146
  • [7] Jullien G.A.(1996)Randomness is linear in space J. Comput. Syst. Sci. 52 43-52
  • [8] Miller W.C.(1981)New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 265-279
  • [9] Dodis Y.(undefined)undefined undefined undefined undefined-undefined
  • [10] Ostrovsky R.(undefined)undefined undefined undefined undefined-undefined