Efficient chosen ciphertext secure public-key encryption under factoring assumption

被引:2
|
作者
Qin, Baodong [1 ,2 ]
Liu, Shengli [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Southwest Univ Sci & Technol, Coll Comp Sci & Technol, Mianyang 621010, Peoples R China
基金
中国国家自然科学基金;
关键词
public-key encryption; chosen ciphertext attack; factoring; signed quadratic residues; COMPUTATIONAL DIFFIE-HELLMAN; TRAPDOOR FUNCTIONS; HYBRID ENCRYPTION; PARADIGM; CRYPTOSYSTEM; PROOFS;
D O I
10.1002/sec.571
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In EUROCRYPT 2009, Hofheinz and Kiltz introduced a new practical chosen ciphertext secure public-key encryption scheme under the assumption that factoring is intractable. They also proposed a variant that features a slightly more efficient decryption but unfortunately leads to large public key, of size about O(k), where k is a security parameter. In this paper, we propose a novel method to balance the efficiency and the key size of those previous two schemes. Although the public key in our scheme only consists of one RSA modulus and three group elements, it is still more efficient at decrypting than Hofheinz and Kiltz's scheme. By remarking that under certain assumptions factoring the modulus is still hard over much smaller subgroups of signed quadratic residues (i.e., semismooth subgroup), we were able to construct a new scheme that performs extremely efficient decryption. In fact, to date, this is the most efficient scheme for decryption among all public-key encryption schemes (mainly including Hofheinz and Kiltz's schemes and their follow-up works) whose security against chosen ciphertext attacks is based on the intractability of factoring in the standard model. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:351 / 360
页数:10
相关论文
共 50 条
  • [31] On the Power of Public-Key Encryption in Secure Computation
    Mahmoody, Mohammad
    Maji, Hemanta K.
    Prabhakaran, Manoj
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264
  • [32] Tightly secure signatures and public-key encryption
    Dennis Hofheinz
    Tibor Jager
    [J]. Designs, Codes and Cryptography, 2016, 80 : 29 - 61
  • [33] Tightly Secure Signatures and Public-Key Encryption
    Hofheinz, Dennis
    Jager, Tibor
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 590 - 607
  • [34] Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption
    Baek, J
    Lee, B
    Kim, K
    [J]. ETRI JOURNAL, 2000, 22 (04) : 25 - 31
  • [35] Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
    Qin, Baodong
    Liu, Shengli
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 381 - 400
  • [36] Efficient and secure public-key cryptosystems
    Takagi, T
    [J]. CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237
  • [37] An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    Kim, CH
    Hwang, YH
    Lee, PJ
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 359 - 373
  • [38] Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 307 - 338
  • [39] Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
    Raghunathan, Ananth
    Segev, Gil
    Vadhan, Salil
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 93 - 110
  • [40] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Wang, Ting
    Han, Guoqiang
    Yu, Jianping
    Zhang, Peng
    Sun, Xiaoqiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2973 - 2988