A Note on a Provable Secure Encryption Scheme

被引:0
|
作者
王明强 [1 ]
秦静 [1 ]
机构
[1] School of Mathematics,Shandong University,Jinan 250100,China
基金
中国国家自然科学基金;
关键词
hybrid encryption scheme; chosen-ciphertext attack; authentication function;
D O I
暂无
中图分类号
TP309.2 [数据安全];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
A Cramer-Shoup scheme was modified in a variant way.The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext.The proof of security shows that our scheme can be instantiated with any computational secure key derivation and message authentication functions.Thus it extends the applicability of the Kurosawa-Desmedt scheme and improves its effciency.
引用
收藏
页码:655 / 658
页数:4
相关论文
共 50 条
  • [1] A note on a provable secure encryption scheme
    Wang M.-Q.
    Qin J.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 655 - 658
  • [2] Provable secure multivariate encryption scheme in standard model
    Han, Yiliang
    Yue, Zelun
    Yang, Xiaoyuan
    Wei, Yuechuan
    [J]. Han, Yiliang (yilianghan@hotmail.com), 1600, Huazhong University of Science and Technology (42): : 47 - 51
  • [3] Constructing provable secure broadcast encryption scheme with dealership
    Acharya, Kamalesh
    Dutta, Ratna
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [4] Constructing provable secure broadcast encryption scheme with dealership
    Acharya, Kamalesh
    Dutta, Ratna
    [J]. Journal of Information Security and Applications, 2021, 58
  • [5] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    [J]. PLOS ONE, 2014, 9 (09):
  • [6] A Provable IND-CCA2 Secure Hybrid Encryption Scheme
    Qi Zhifeng
    Qing Sihan
    Cheng Guanghui
    [J]. 2011 AASRI CONFERENCE ON INFORMATION TECHNOLOGY AND ECONOMIC DEVELOPMENT (AASRI-ITED 2011), VOL 1, 2011, : 254 - 257
  • [7] A Provable IND-CCA2 Secure Hybrid Encryption Scheme
    Qi Zhifeng
    Qing Sihan
    Cheng Guanghui
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL IV, 2011, : 254 - 257
  • [8] Provable secure leakage-resilient predicate encryption scheme without random oracle
    Zhang, Xiujie
    Xu, Chunxiang
    Li, Wanpeng
    [J]. Journal of Computational Information Systems, 2013, 9 (12): : 4681 - 4689
  • [9] Provable secure digital watermarking scheme
    Yuan, Zheng
    [J]. Tongxin Xuebao/Journal on Communications, 2008, 29 (09): : 91 - 96
  • [10] Provable Secure Constructions for Broadcast Encryption with Personalized Messages
    Acharya, Kamalesh
    Dutta, Ratna
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 329 - 348