Improved Encryption Padding for ECC System with Provable Security

被引:0
|
作者
Yang Yatao [1 ]
Zhang Fengjuan [1 ,2 ]
Li Zichen [1 ,2 ,3 ]
Zhang Yaze [1 ,2 ]
机构
[1] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[2] Xidian Univ, Inst Commun Engn, Xian 710071, Shaanxi, Peoples R China
[3] Beijing Inst Graph Commun, Beijing 102600, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Padding scheme; Provable security; CCA2;
D O I
10.1007/978-3-319-60744-3_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to solve the security problem of ECC cryptosystem, the security deficiency of elliptic curve encryption is described firstly in this paper. Then, the method of OAEP (Optimal Asymmetric Encryption Padding) in the random oracle model is adopted to enhance the security of the existing ECC encryption system. An improved encryption padding scheme for ECC cryptosystem, namely EOAEP (ECC OAEP), is proposed and designed in this paper, Under the one-way assumption of encryption function, it has been proved that our scheme satisfies adaptive chosen ciphertext security by using the Game-Hopping technology according to the random oracle model.
引用
收藏
页码:231 / 239
页数:9
相关论文
共 50 条
  • [41] Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
    Gong, Linming
    Wang, Mingming
    Zuo, Xiangjian
    Li, Shundong
    Wang, Daoshun
    [J]. IEEE ACCESS, 2019, 7 : 6765 - 6773
  • [42] Biometric Encryption System for Increased Security
    Jayapal, Ranjith
    Govindan, Pramod
    [J]. 2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 173 - 175
  • [43] Mimic Encryption System for Network Security
    Li, Bin
    Zhou, Qinglei
    Si, Xueming
    Fu, Jinhua
    [J]. IEEE ACCESS, 2018, 6 : 50468 - 50487
  • [44] An adaptive security/performance encryption system
    El-Hennawy, ME
    Dakroury, YH
    Kouta, MM
    El-Gendy, MM
    [J]. ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 245 - 248
  • [45] Database Padding for Dynamic Symmetric Searchable Encryption
    Du, Ruizhong
    Zhang, Yuqing
    Li, Mingyue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [46] Improved Security Based on Combined Encryption and Steganography Techniques
    Mocanu, Stefan
    Duluta, Andrei
    Merezeanu, Daniel
    Pietraru, Radu
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2017, 26 (01): : 115 - 126
  • [47] Substitution Steganography with Security Improved by Chaotic Image Encryption
    Oravec, Jakub
    Turan, Jan
    [J]. 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
  • [48] Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model
    Hirose, Shoichi
    Kuwakado, Hidenori
    Yoshida, Hirotaka
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (11) : 1894 - 1901
  • [49] QUANTUM-SAFE IDENTITY-BASED BROADCAST ENCRYPTION WITH PROVABLE SECURITY FROM MULTIVARIATE CRYPTOGRAPHY
    Sarkar, Ramprasad
    Mandal, Mriganka
    Mukhopadhyay, Sourav
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (03) : 814 - 827
  • [50] Another look at "provable security"
    Koblitz, Neal
    Menezes, Alfred J.
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 3 - 37