Compact public key encryption without full random oracles

被引:0
|
作者
Yoneyama, Kazuki [1 ]
Hanaoka, Goichiro [2 ]
机构
[1] Ibaraki Univ, 4-12-1 Nakanarusawa Cho, Hitachi, Ibaraki, Japan
[2] Natl Inst Adv Ind Sci & Technol, Koto Ku, 2-4-7 Aomi, Tokyo, Japan
关键词
Random oracle; Observability; Public key encryption; Chosen ciphertext security; Ciphertext overhead; COMPUTATIONAL DIFFIE-HELLMAN; SECURE; ENCAPSULATION; CRYPTOSYSTEM; SCHEMES;
D O I
10.1016/j.pmcj.2016.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving shorter ciphertext length under weaker assumptions in chosen-ciphertext (CCA) secure public-key encryption (PKE) is one of the most important research topics in cryptography. However, it is also known that it is hard to construct a CCA-secure PKE whose ciphertext overhead is less than two group elements in the underlying prime-order group under non-interactive assumptions. A naive approach for achieving more compactness than the above bound is to use random oracles (ROs), but the full RO has various ideal properties like programmability. In this paper, we pursue how to achieve compact PKE only with a minimum ideal property of ROs. Specifically, only with observability, we can give three CCA-secure PKE schemes whose ciphertext overhead is less than two group elements. Our schemes are provably secure under standard assumptions such as the CDH and DDH assumptions. This study shows that ideal properties other than observability are not necessary to construct compact PKE beyond the bound. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:286 / 299
页数:14
相关论文
共 50 条
  • [1] Parallel key-insulated public key encryption without random oracles
    Libert, Benoit
    Quisquater, Jean-Jacques
    Yung, Moti
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 298 - +
  • [2] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [3] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243
  • [4] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [5] Towards plaintext-aware public-key encryption without random oracles
    Bellare, M
    Palacio, A
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 48 - 62
  • [6] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [7] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie ZHANG
    Chunxiang XU
    Wenzheng ZHANG
    Wanpeng LI
    Frontiers of Computer Science, 2013, 7 (06) : 955 - 968
  • [8] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie Zhang
    Chunxiang Xu
    Wenzheng Zhang
    Wanpeng Li
    Frontiers of Computer Science, 2013, 7 : 955 - 968
  • [9] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Zhang, Xiujie
    Xu, Chunxiang
    Zhang, Wenzheng
    Li, Wanpeng
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (06) : 955 - 968
  • [10] Certificateless public key encryption in the Selective-ID security model (Without random oracles)
    Park, Jong Hwan
    Choi, Kyu Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 60 - +