A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack

被引:0
作者
Yvo Desmedt
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
机构
[1] University College London,Dept. of Computer Science
[2] IBM T.J. Watson Research Center,Dept. of Computer and Information Sciences
[3] Ibaraki University,Computer Science Dept.
[4] NYU,undefined
来源
Journal of Cryptology | 2010年 / 23卷
关键词
Public key encryption; Chosen ciphertext security; Projective hash proofs;
D O I
暂无
中图分类号
学科分类号
摘要
We present a new encryption scheme which is secure against adaptive chosen-ciphertext attack (or CCA2-secure) in the standard model (i.e., without the use of random oracle). Our scheme is a hybrid one: it first uses a public-key step (the Key Encapsulation Module or KEM) to encrypt a random key, which is then used to encrypt the actual message using a symmetric encryption algorithm (the Data Encapsulation Module or DEM).
引用
收藏
页码:91 / 120
页数:29
相关论文
共 10 条
[1]  
Abe M.(2008)Tag-KEM/DEM: a new framework for hybrid encryption J. Cryptol. 21 97-130
[2]  
Gennaro R.(2004)The random oracle methodology, revisited J. ACM 51 557-594
[3]  
Kurosawa K.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
[4]  
Canetti R.(1976)New directions in cryptography IEEE Trans. Inf. Theory IT-22 644-654
[5]  
Goldreich O.(undefined)undefined undefined undefined undefined-undefined
[6]  
Halevi S.(undefined)undefined undefined undefined undefined-undefined
[7]  
Cramer R.(undefined)undefined undefined undefined undefined-undefined
[8]  
Shoup V.(undefined)undefined undefined undefined undefined-undefined
[9]  
Diffie W.(undefined)undefined undefined undefined undefined-undefined
[10]  
Hellman M.(undefined)undefined undefined undefined undefined-undefined