Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited

被引:0
|
作者
Mei, Qixiang [1 ]
Li, Bao [1 ]
Lu, Xianhui [1 ]
Jia, Dingding [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
关键词
public key encryption; chosen ciphertext secure; semi-smooth subgroup; factoring assumption; PUBLIC-KEY ENCRYPTION; COMPUTATIONAL DIFFIE-HELLMAN; HYBRID ENCRYPTION; PARADIGM; CRYPTOSYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Eurocrypt 2009, Hofheinz and Kiltz proposed a practical chosen ciphertext (CCA) secure public key encryption under factoring assumption based on Rabin trapdoor one-way permutation. We show that when the modulus is special such that Z(N)* has semi-smooth order, the instantiation of Hofheinz-Kiltz 09 scheme (HK09) over a much smaller subgroup of quadratic residue group (Semi-smooth Subgroup) is CCA secure as long as this type of modulus is hard to be factored. Since the exponent domain of this instantiation is much smaller than the original one, the efficiency is substantially improved. In addition, we show how to construct a practical CCA secure encryption scheme from ElGamal trapdoor one-way function under factoring assumption. When instantiated over Semi-smooth Subgroup, this scheme has even better decryption efficiency than HK09 instantiation.
引用
收藏
页码:210 / 227
页数:18
相关论文
共 50 条
  • [21] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [22] Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
    Pal, Tapas
    Dutta, Ratna
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 24 - 45
  • [23] Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
    Zuo, Cong
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    Ji, Min
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 495 - 508
  • [24] Chosen ciphertext secure fuzzy identity based encryption without ROM
    Fang L.-M.
    Wang J.-D.
    Ren Y.-J.
    Xia J.-Y.
    Bian S.-Z.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 646 - 650
  • [25] Chosen Ciphertext Secure Fuzzy Identity Based Encryption without ROM
    方黎明
    王建东
    任勇军
    夏金月
    卞仕柱
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 646 - 650
  • [26] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408
  • [27] Broadcast group-oriented encryption secure against chosen ciphertext attack
    Ma Chunbo
    The State Key Laboratory of Information Security
    State Key Laboratory for Radar Signal Processing
    [J]. Journal of Systems Engineering and Electronics, 2007, (04) : 811 - 817
  • [28] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    Fehr, Serge
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 381 - +
  • [29] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Wang, Ting
    Han, Guoqiang
    Yu, Jianping
    Zhang, Peng
    Sun, Xiaoqiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2973 - 2988
  • [30] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243