Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption

被引:0
|
作者
Hanaoka, Goichiro
Kurosawa, Kaoru
机构
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently Cash, Kiltz, and Shoup [13] showed a variant of the Cramer-Shoup (CS) scheme [14] whose chosen-ciphertext (CCA) security relies on the computational Diffie-Hellman (CDH) assumption. The cost for this high security is that the size of ciphertexts is much longer than the CS scheme (which is based on the decisional Diffie-Hellman assumption). In this paper, we show how to achieve CCA-security under the CDH assumption without increasing the size of ciphertexts. We also show a more efficient scheme under the hashed Diffie-Hellman assumption. Both of our schemes are based on a certain broadcast encryption (BE) scheme while the Cash-Kiltz-Shoup scheme is based on the Twin DH problem. Of independent interest, we also show a generic method of constructing CCA-secure PKE schemes from BE schemes.
引用
收藏
页码:308 / 325
页数:18
相关论文
共 50 条
  • [41] MANET Secure Key Exchange using Spraying Diffie-Hellman Algorithm
    Stulman, Ariel
    Lahav, Jonathan
    Shmueli, Avraham
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 249 - 252
  • [42] Improving the single-assumption authenticated diffie-hellman key agreement Protocols
    Yoon, Eun-Jun
    Lee, Wan-Soo
    Yoo, Kee-Young
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 926 - +
  • [43] A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
    Camenisch, Jan
    Chandran, Nishanth
    Shoup, Victor
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 351 - +
  • [44] TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
    Pan, Jiaxin
    Wang, Libin
    [J]. PROVABLE SECURITY, 2011, 6980 : 380 - 388
  • [45] An efficient public key cryptosystem secure against chosen ciphertext attack
    Ghodosi, Hossein
    [J]. Information Systems Security, Proceedings, 2006, 4332 : 303 - 314
  • [46] Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    Liu, Joseph
    [J]. CRYPTOGRAPHY, 2018, 2 (04) : 1 - 35
  • [47] Secure Authentication Approach Using Diffie-Hellman Key Exchange Algorithm for WSN
    Joshi, Preetika
    Verma, Manju
    Verma, Pushpendra R.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 527 - 531
  • [48] Secure and Efficient Tree-based Group Diffie-Hellman Protocol
    Hong, Sunghyuck
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (02): : 178 - 194
  • [49] Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    Liu, Joseph K.
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 265 - 283
  • [50] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    [J]. IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42