Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length

被引:1
|
作者
Yamakawa, Takashi [1 ,2 ]
Yamada, Shota [1 ]
Matsuda, Takahiro [1 ]
Hanaoka, Goichiro [1 ]
Kunihiro, Noboru [2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[2] Univ Tokyo, Tokyo, Japan
来源
关键词
Bounded CCA security; Factoring; CBDH assumption; ENCRYPTION SCHEMES; DIFFIE-HELLMAN; FINITE SETS; NO SET; ASSUMPTION; FAMILIES; OTHERS; UNION;
D O I
10.1007/978-3-319-27659-5_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Currently, chosen-ciphertext (CCA) security is considered as the de facto standard security notion for public key encryption (PKE), and a number of CCA-secure schemes have been proposed thus far. However, CCA-secure PKE schemes are generally less efficient than schemes with weaker security, e.g., chosen-plaintext security, due to their strong security. Surprisingly, Cramer et al. (Asiacrypt 2007) demonstrated that it is possible to construct a PKE scheme from the decisional Diffie-Hellman assumption that yields (i) bounded CCA (BCCA) security which is only slightly weaker than CCA security, and (ii) one group element of ciphertext overhead which is optimal. In this paper, we propose two novel BCCA-secure PKE schemes with optimal ciphertext length that are based on computational assumptions rather than decisional assumptions and that yield shorter (or at least comparable) public key sizes. Our first scheme is based on the computational bilinear Diffie-Hellman assumption and yields O(lambda q) group elements of public key length, and our second scheme is based on the factoring assumption and yields O(lambda q(2)) group elements of public key length, while in Cramer et al.' s scheme, a public key consists of O(lambda q(2)) group elements, where lambda is the security parameter and q is the number of decryption queries. Moreover, our second scheme is the first PKE scheme which is BCCA-secure under the factoring assumption and yields optimal ciphertext overhead.
引用
收藏
页码:100 / 109
页数:10
相关论文
共 50 条
  • [21] CCA-SECURE KEY ENCAPSULATION MECHANISM BASED ON FACTORING ASSUMPTION
    Marton, Gyoengyver
    TATRACRYPT '12, 2012, 53 : 137 - 146
  • [22] POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption
    Hoffmann, Clement
    Libert, Benoit
    Momin, Charles
    Peters, Thomas
    Standaert, Francois-Xavier
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 114 - 144
  • [23] Efficient CCA-secure public-key encryption schemes from RSA-related assumptions
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 176 - +
  • [24] New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption
    Luo, Haining
    Wang, Xu An
    International Journal of Information and Communication Technology, 2015, 7 (2-3) : 235 - 246
  • [25] Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
    Qin, Baodong
    Liu, Shengli
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 19 - 36
  • [26] Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption
    Faonio, Antonio
    Russo, Luigi
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 172 - 196
  • [27] Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
    Yao, Lisha
    Weng, Jian
    Yang, Anjia
    Liang, Xiaojian
    Wu, Zhenghao
    Jiang, Zike
    Hou, Lin
    INFORMATION SCIENCES, 2023, 624 : 777 - 795
  • [28] RCCA security for KEM plus DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions
    Chen Yuan
    Dong Qingkuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1219 - 1231
  • [29] Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Matsuura, Kanta
    Imai, Hideki
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 1 - +
  • [30] A compact hardware implementation of cca-secure key exchange mechanism crystals-kyber on fpga
    Xing Y.
    Li S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (02): : 328 - 356