Chosen-ciphertext attack secure public key encryption with auxiliary inputs

被引:2
|
作者
Zhang, Zongyang [1 ]
Cao, Zhenfu [1 ]
Qian, Haifeng [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
public key encryption; chosen-ciphertext attacks; auxiliary input; Naor-Yung paradigm; RESILIENT; CRYPTOGRAPHY; SCHEMES;
D O I
10.1002/sec.504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the NaorYung double encryption paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1404 / 1411
页数:8
相关论文
共 50 条
  • [31] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [32] Chosen-ciphertext security of multiple encryption
    Dodis, Y
    Katz, J
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 188 - 209
  • [33] A chosen-ciphertext attack against NTRU
    Jaulmes, É
    Joux, A
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 20 - 35
  • [34] Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (05) : 3256 - 3256
  • [35] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Ting Wang
    Guoqiang Han
    Jianping Yu
    Peng Zhang
    Xiaoqiang Sun
    Wireless Personal Communications, 2017, 95 : 2973 - 2988
  • [36] Efficient chosen-ciphertext secure identity-based encryption with wildcards
    Birkett, James
    Dent, Alexander W.
    Neven, Gregory
    Schuldt, Jacob C. N.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 274 - +
  • [37] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176
  • [38] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243
  • [39] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Emura, Keita
    Hanaoka, Goichiro
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 32 - 50
  • [40] Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    Cramer, R
    Shoup, V
    SIAM JOURNAL ON COMPUTING, 2003, 33 (01) : 167 - 226