Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited

被引:0
|
作者
Mei, Qixiang [1 ]
Li, Bao [1 ]
Lu, Xianhui [1 ]
Jia, Dingding [1 ]
机构
[1] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
来源
关键词
public key encryption; chosen ciphertext secure; semi-smooth subgroup; factoring assumption; PUBLIC-KEY ENCRYPTION; COMPUTATIONAL DIFFIE-HELLMAN; HYBRID ENCRYPTION; PARADIGM; CRYPTOSYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Eurocrypt 2009, Hofheinz and Kiltz proposed a practical chosen ciphertext (CCA) secure public key encryption under factoring assumption based on Rabin trapdoor one-way permutation. We show that when the modulus is special such that Z(N)* has semi-smooth order, the instantiation of Hofheinz-Kiltz 09 scheme (HK09) over a much smaller subgroup of quadratic residue group (Semi-smooth Subgroup) is CCA secure as long as this type of modulus is hard to be factored. Since the exponent domain of this instantiation is much smaller than the original one, the efficiency is substantially improved. In addition, we show how to construct a practical CCA secure encryption scheme from ElGamal trapdoor one-way function under factoring assumption. When instantiated over Semi-smooth Subgroup, this scheme has even better decryption efficiency than HK09 instantiation.
引用
收藏
页码:210 / 227
页数:18
相关论文
共 50 条
  • [41] Broadcast group-oriented encryption secure against chosen ciphertext attack
    Ma Chunbo
    Ao Jun
    Li Jianhua
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2007, 18 (04) : 811 - 817
  • [42] Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption
    Hara, Keisuke
    Matsuda, Takahiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (03) : 160 - 172
  • [43] Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (05) : 3256 - 3256
  • [44] Efficient chosen-ciphertext secure identity-based encryption with wildcards
    Birkett, James
    Dent, Alexander W.
    Neven, Gregory
    Schuldt, Jacob C. N.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 274 - +
  • [45] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Ting Wang
    Guoqiang Han
    Jianping Yu
    Peng Zhang
    Xiaoqiang Sun
    [J]. Wireless Personal Communications, 2017, 95 : 2973 - 2988
  • [46] Trading one-wayness against chosen-ciphertext security in factoring-based encryption
    Paillier, Pascal
    Villar, Jorge L.
    [J]. Advances in Cryptology - ASIACRYPT 2006, 2006, 4284 : 252 - 266
  • [47] Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes
    Wang, Xu An
    Nie, Jinting
    Wang, Wei
    [J]. PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 507 - 510
  • [48] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176
  • [49] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Yvo Desmedt
    Rosario Gennaro
    Kaoru Kurosawa
    Victor Shoup
    [J]. Journal of Cryptology, 2010, 23 : 91 - 120
  • [50] Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 94 - +