Improved Encryption Padding for ECC System with Provable Security

被引:0
|
作者
Yang Yatao [1 ]
Zhang Fengjuan [1 ,2 ]
Li Zichen [1 ,2 ,3 ]
Zhang Yaze [1 ,2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[2] Xidian Univ, Inst Commun Engn, Xian 710071, Shaanxi, Peoples R China
[3] Beijing Inst Graph Commun, Beijing 102600, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Padding scheme; Provable security; CCA2;
D O I
10.1007/978-3-319-60744-3_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to solve the security problem of ECC cryptosystem, the security deficiency of elliptic curve encryption is described firstly in this paper. Then, the method of OAEP (Optimal Asymmetric Encryption Padding) in the random oracle model is adopted to enhance the security of the existing ECC encryption system. An improved encryption padding scheme for ECC cryptosystem, namely EOAEP (ECC OAEP), is proposed and designed in this paper, Under the one-way assumption of encryption function, it has been proved that our scheme satisfies adaptive chosen ciphertext security by using the Game-Hopping technology according to the random oracle model.
引用
收藏
页码:231 / 239
页数:9
相关论文
共 50 条
  • [1] EPN: encryption padding for NTRU with provable security
    Key Lab of Computer Networks and Information Security, Xidian University, Xi'an 710071, China
    [J]. Tongxin Xuebao, 2008, 10 (3-7):
  • [2] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [3] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128
  • [4] Provable-security analysis of authenticated encryption in Kerberos
    Boldyreva, A.
    Kumar, V.
    [J]. IET INFORMATION SECURITY, 2011, 5 (04) : 207 - 219
  • [5] Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
    Zhang, Jianyi
    Song, Chenggen
    Wang, Zhiqiang
    Yang, Tao
    Ma, Wenming
    [J]. IEEE ACCESS, 2018, 6 : 68384 - 68393
  • [6] New Limits of Provable Security and Applications to ElGamal Encryption
    Schage, Sven
    [J]. ADVANCES IN CRYPTOLOGY, PT IV, EUROCRYPT 2024, 2024, 14654 : 255 - 285
  • [7] OCDM-based photonic encryption with provable security
    Di Crescenzo, Giovanni
    Menendez, Ron
    Etemad, Shahab
    [J]. 2008 CONFERENCE ON OPTICAL FIBER COMMUNICATION/NATIONAL FIBER OPTIC ENGINEERS CONFERENCE, VOLS 1-8, 2008, : 2529 - 2531
  • [8] Towards provable security of substitution-permutation encryption networks
    Chen, ZG
    Tavares, SE
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 43 - 56
  • [9] A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security
    Peng, Zhiniang
    Tang, Shaohua
    Jiang, Linzhi
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 86 - 99
  • [10] An approach for symmetric encryption against side channel attacks in provable security
    Li, Wei
    Gu, Dawu
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 178 - +