Efficient leakage-resilient public key encryption from DDH assumption

被引:0
作者
Sujuan Li
Futai Zhang
Yinxia Sun
Limin Shen
机构
[1] Nanjing Normal University,
[2] Nanjing University of Technology,undefined
来源
Cluster Computing | 2013年 / 16卷
关键词
Decisional Diffie-Hellman assumption; Adaptive posteriori chosen ciphertext attack; Leakage resilient; Cramer-Shoup encryption; Key leakage; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
For an encryption scheme to be applied in practical applications, it should withstand various leakage attacks. In this paper, we present a new leakage-resilient public key encryption scheme whose security is based on the classical DDH (decisional Diffie-Hellman) assumption. In the computational cost, our proposed scheme is more efficient than the original Cramer-Shoup leakage-resilient public key encryption scheme. At the same time, our new scheme also enjoys a shorter (public and secret) key length, and a higher relative key leakage ratio. We formally prove our new proposal is semantically secure against adaptive posteriori chosen ciphertext key-leakage attacks assuming the hardness of the DDH problem without random models.
引用
收藏
页码:797 / 806
页数:9
相关论文
共 17 条
[1]  
Avanzi R.M.(2005)The complexity of certain multi-exponentiation techniques in cryptography J. Cryptol. 18 357-373
[2]  
Carter J.L.(1979)Universal classes of hash functions J. Comput. Syst. Sci. 18 143-154
[3]  
Wegman M.N.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
[4]  
Cramer R.(2000)Complexity and fast algorithms for multiexponentiations IEEE Trans. Comput. 49 141-147
[5]  
Shoup V.(2008)Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM J. Comput. 38 97-139
[6]  
Dimitrov V.S.(1998)A survey of fast exponentiation methods J. Algorithms 27 129-146
[7]  
Jullien G.A.(1996)Randomness is linear in space J. Comput. Syst. Sci. 52 43-52
[8]  
Miller W.C.(1981)New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 265-279
[9]  
Dodis Y.(undefined)undefined undefined undefined undefined-undefined
[10]  
Ostrovsky R.(undefined)undefined undefined undefined undefined-undefined