Chosen ciphertext secure public key threshold encryption without random oracles

被引:0
|
作者
Boneh, D [1 ]
Boyen, X
Halevi, S
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Voltage Secur, Palo Alto, CA USA
[3] IBM Corp, TJ Watson Res Ctr, Armonk, NY 10504 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our construction uses the recent identity based encryption system of Boneh and Boyen and the chosen ciphertext secure construction of Canetti, Halevi, and Katz.
引用
收藏
页码:226 / 243
页数:18
相关论文
共 50 条
  • [1] Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles
    Galindo, David
    Kiltz, Eike
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 173 - 185
  • [2] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [3] Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
    Hanaoka, Goichiro
    Imai, Hideki
    Ogawa, Kazuto
    Watanabe, Hajime
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2008, 5312 : 20 - 33
  • [4] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    [J]. THEORETICAL COMPUTER SCIENCE, 2009, 410 (47-49) : 5093 - 5111
  • [5] Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
    Kiltz, Eike
    Galindo, David
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 336 - 347
  • [6] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200
  • [7] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176
  • [8] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [9] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Emura, Keita
    Hanaoka, Goichiro
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 32 - 50
  • [10] Chosen-ciphertext attack secure public key encryption with auxiliary inputs
    Zhang, Zongyang
    Cao, Zhenfu
    Qian, Haifeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1404 - 1411