Efficient chosen ciphertext secure public-key encryption under factoring assumption

被引:2
|
作者
Qin, Baodong [1 ,2 ]
Liu, Shengli [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Southwest Univ Sci & Technol, Coll Comp Sci & Technol, Mianyang 621010, Peoples R China
基金
中国国家自然科学基金;
关键词
public-key encryption; chosen ciphertext attack; factoring; signed quadratic residues; COMPUTATIONAL DIFFIE-HELLMAN; TRAPDOOR FUNCTIONS; HYBRID ENCRYPTION; PARADIGM; CRYPTOSYSTEM; PROOFS;
D O I
10.1002/sec.571
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In EUROCRYPT 2009, Hofheinz and Kiltz introduced a new practical chosen ciphertext secure public-key encryption scheme under the assumption that factoring is intractable. They also proposed a variant that features a slightly more efficient decryption but unfortunately leads to large public key, of size about O(k), where k is a security parameter. In this paper, we propose a novel method to balance the efficiency and the key size of those previous two schemes. Although the public key in our scheme only consists of one RSA modulus and three group elements, it is still more efficient at decrypting than Hofheinz and Kiltz's scheme. By remarking that under certain assumptions factoring the modulus is still hard over much smaller subgroups of signed quadratic residues (i.e., semismooth subgroup), we were able to construct a new scheme that performs extremely efficient decryption. In fact, to date, this is the most efficient scheme for decryption among all public-key encryption schemes (mainly including Hofheinz and Kiltz's schemes and their follow-up works) whose security against chosen ciphertext attacks is based on the intractability of factoring in the standard model. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:351 / 360
页数:10
相关论文
共 50 条
  • [1] Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited
    Mei, Qixiang
    Li, Bao
    Lu, Xianhui
    Jia, Dingding
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 210 - 227
  • [2] Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
    Hanaoka, Goichiro
    Kurosawa, Kaoru
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 308 - 325
  • [3] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Emura, Keita
    Hanaoka, Goichiro
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 32 - 50
  • [4] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [5] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    [J]. IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [6] Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    Cramer, R
    Shoup, V
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 45 - 64
  • [7] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200
  • [8] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 313 - 332
  • [9] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    Shoup, Victor
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 102 - 118
  • [10] Practical Chosen Ciphertext Secure Encryption from Factoring
    Dennis Hofheinz
    Eike Kiltz
    Victor Shoup
    [J]. Journal of Cryptology, 2013, 26 : 102 - 118