Secure Integration of Asymmetric and Symmetric Encryption Schemes

被引:192
|
作者
Fujisaki, Eiichiro [1 ]
Okamoto, Tatsuaki [1 ]
机构
[1] NTT Labs, Musashino, Tokyo 1808585, Japan
关键词
Asymmetric and symmetric (or public-key and private-key) encryptions; Generic conversion; Indistinguishability against chosen ciphertext attacks (IND-CCA); Random oracle model; Security proof; PUBLIC-KEY ENCRYPTION; CHOSEN-CIPHERTEXT SECURITY; HYBRID ENCRYPTION; PARADIGM; CRYPTOSYSTEM; SEARCH;
D O I
10.1007/s00145-011-9114-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a generic conversion from weak asymmetric and symmetric encryption schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the random oracle model. Our conversion is the first generic transformation from an arbitrary one-way asymmetric encryption scheme to a chosen-ciphertext secure asymmetric encryption scheme in the random oracle model.
引用
收藏
页码:80 / 101
页数:22
相关论文
共 50 条
  • [1] Secure Integration of Asymmetric and Symmetric Encryption Schemes
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    [J]. Journal of Cryptology, 2013, 26 : 80 - 101
  • [2] Symmetric and Asymmetric Schemes for Lightweight Secure Communication
    Buchovecka, Simona
    Lorencz, Robert
    Bucek, Jiri
    Kodytek, Filip
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2020, 2022, 1545 : 97 - 114
  • [3] Towards provably secure asymmetric image encryption schemes
    Azam, Naveed Ahmed
    Zhu, Jianshen
    Hayat, Umar
    Shurbevski, Aleksandar
    [J]. INFORMATION SCIENCES, 2023, 631 (164-184) : 164 - 184
  • [4] Efficient and secure multi-functional searchable symmetric encryption schemes
    Hu, Changhui
    Han, Lidong
    Yiu, Siu Ming
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (01) : 34 - 42
  • [5] SYMMETRIC AND ASYMMETRIC ENCRYPTION
    SIMMONS, GJ
    [J]. COMPUTING SURVEYS, 1979, 11 (04) : 305 - 330
  • [6] More secure on the symmetric encryption schemes based on triple vertex path graph
    Shathir, Muhaimen Khudhair
    Arif, Ghassan Ezzulddin
    Ajeena, Ruma Kareem K.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 1175 - 1182
  • [7] Demonstration of symmetric and asymmetric encryption
    Mendoza T, Julio Cesar
    [J]. INGENIUS-REVISTA DE CIENCIA Y TECNOLOGIA, 2008, (03): : 46 - 53
  • [8] METHODS FOR INTEGRATING SYMMETRIC AND ASYMMETRIC ENCRYPTION SCHEMES: SCRAMBLED AND COMBINED KEM-DEM
    Yildirim, Kerim
    Demiray, H. Engin
    [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2008, 23 (03): : 539 - 548
  • [9] Forward Secure Searchable Symmetric Encryption
    Niaz, Muhammad Saqib
    Saake, Gunter
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 49 - 54
  • [10] New paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack
    Desai, A
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 394 - 412