Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal

被引:0
|
作者
Kim, Gyu Chol [1 ]
Ji, Hyon A. [1 ]
Jong, Yong Bok [1 ]
Kim, Gwang Hyok [1 ]
Kim, Hak Su [1 ]
机构
[1] Kim Chaek Univ Technol, Fac Informat Sci & Technol, Pyongyang, North Korea
来源
PLOS ONE | 2023年 / 18卷 / 11期
关键词
PUBLIC-KEY CRYPTOSYSTEM; SHORT SIGNATURES; DIFFLE-HELLMAN; ENCRYPTION;
D O I
10.1371/journal.pone.0294840
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In order to prove the ElGamal CCA(Chosen Ciphertext Attack) security in the random oracle model, it is necessary to use the group where ICDH(Interactive Computational Diffie Hellman) assumption holds. Until now, only bilinear group with complex algebraic structure has been known as the ICDH group. In this paper, we introduce the ICDH group with simple algebraic structure. In other words, we prove that ICDH assumption holds in the integer group with composite modulus. On the basis of this, we propose the CCA secure hashed ElGamal and its fast variant to speed up decryption by parallel processing. Our parallel scheme has the fastest decryption among all CCA secure PKE(Public Key Encryption) schemes implemented in integer group and gives the possibility that ElGamal protocol could be practical when the big modulus numbers are used to resist the quantum attack.
引用
收藏
页数:17
相关论文
共 46 条