Chosen-ciphertext attack secure public key encryption with auxiliary inputs

被引:2
|
作者
Zhang, Zongyang [1 ]
Cao, Zhenfu [1 ]
Qian, Haifeng [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
public key encryption; chosen-ciphertext attacks; auxiliary input; Naor-Yung paradigm; RESILIENT; CRYPTOGRAPHY; SCHEMES;
D O I
10.1002/sec.504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the NaorYung double encryption paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1404 / 1411
页数:8
相关论文
共 50 条
  • [1] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [2] Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
    Joo, Chihong
    Yun, Aaram
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 173 - 192
  • [3] Improved public key encryption scheme secure against adaptive chosen-ciphertext attacks
    Chen, Min-Rong
    Zhang, Xi
    He, Kai
    Guan, Chao-Wen
    Liu, Dan
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (06): : 1149 - 1154
  • [4] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [5] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Yvo Desmedt
    Rosario Gennaro
    Kaoru Kurosawa
    Victor Shoup
    [J]. Journal of Cryptology, 2010, 23 : 91 - 120
  • [6] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Desmedt, Yvo
    Gennaro, Rosario
    Kurosawa, Kaoru
    Shoup, Victor
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (01) : 91 - 120
  • [7] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [8] New paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack
    Desai, A
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 394 - 412
  • [9] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    [J]. IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [10] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92