A new aspect for security notions: Secure randomness in public-key encryption schemes

被引:0
|
作者
Koshiba, T [1 ]
机构
[1] Fujitsu Labs Ltd, Secure Comp Lab, Nakahara Ku, Kawasaki, Kanagawa 2118588, Japan
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a framework in which we can uniformly and comprehensively discuss security notions of public-key encryption schemes even for the case where some weak generator producing seemingly random sequences is used to encrypt plaintext messages. First, we prove that indistinguishability and semantic security are not equivalent in general. On the other hand, we derive some sufficient condition for the equivalence and show that polynomial-time pseudo-randomness is not always necessary for the equivalence.
引用
收藏
页码:87 / 103
页数:17
相关论文
共 50 条
  • [1] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [2] Relations among notions of security for public-key encryption schemes
    Bellare, M
    Desai, A
    Pointcheval, D
    Rogaway, P
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 26 - 45
  • [3] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227
  • [4] A research on new public-key encryption schemes
    Jiang, ZT
    Xiang, MS
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 51 - 61
  • [5] A refined definition of semantic security for public-key encryption schemes
    Sakai, H
    Nakamura, N
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (01): : 34 - 39
  • [6] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    [J]. IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [7] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [8] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [9] Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
    Pan, Jiaxin
    Zeng, Runzhi
    [J]. ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 363 - 393
  • [10] Tightly secure signatures and public-key encryption
    Hofheinz, Dennis
    Jager, Tibor
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (01) : 29 - 61