Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length

被引:1
|
作者
Yamakawa, Takashi [1 ,2 ]
Yamada, Shota [1 ]
Matsuda, Takahiro [1 ]
Hanaoka, Goichiro [1 ]
Kunihiro, Noboru [2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
[2] Univ Tokyo, Tokyo, Japan
来源
关键词
Bounded CCA security; Factoring; CBDH assumption; ENCRYPTION SCHEMES; DIFFIE-HELLMAN; FINITE SETS; NO SET; ASSUMPTION; FAMILIES; OTHERS; UNION;
D O I
10.1007/978-3-319-27659-5_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Currently, chosen-ciphertext (CCA) security is considered as the de facto standard security notion for public key encryption (PKE), and a number of CCA-secure schemes have been proposed thus far. However, CCA-secure PKE schemes are generally less efficient than schemes with weaker security, e.g., chosen-plaintext security, due to their strong security. Surprisingly, Cramer et al. (Asiacrypt 2007) demonstrated that it is possible to construct a PKE scheme from the decisional Diffie-Hellman assumption that yields (i) bounded CCA (BCCA) security which is only slightly weaker than CCA security, and (ii) one group element of ciphertext overhead which is optimal. In this paper, we propose two novel BCCA-secure PKE schemes with optimal ciphertext length that are based on computational assumptions rather than decisional assumptions and that yield shorter (or at least comparable) public key sizes. Our first scheme is based on the computational bilinear Diffie-Hellman assumption and yields O(lambda q) group elements of public key length, and our second scheme is based on the factoring assumption and yields O(lambda q(2)) group elements of public key length, while in Cramer et al.' s scheme, a public key consists of O(lambda q(2)) group elements, where lambda is the security parameter and q is the number of decryption queries. Moreover, our second scheme is the first PKE scheme which is BCCA-secure under the factoring assumption and yields optimal ciphertext overhead.
引用
收藏
页码:100 / 109
页数:10
相关论文
共 50 条
  • [31] Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
    Hanaoka, Goichiro
    Imai, Hideki
    Ogawa, Kazuto
    Watanabe, Hajime
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2008, 5312 : 20 - 33
  • [32] Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
    Hu, Chengyu
    Yu, Zuoxia
    Yang, Rupeng
    Xu, Qiuliang
    Zhou, Yongbin
    Yuan, Qixia
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 216 - 229
  • [33] Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability
    Li Kang
    XiaoHu Tang
    JiaFen Liu
    Science China Information Sciences, 2014, 57 : 1 - 14
  • [34] Tight chosen ciphertext attack(CCA)-secure hybrid encryption scheme with full public verifiability
    KANG Li
    TANG XiaoHu
    LIU JiaFen
    ScienceChina(InformationSciences), 2014, 57 (11) : 162 - 175
  • [35] Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption
    Chen, Kaiming
    Miyaji, Atsuko
    Chen, Jiageng
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 168 - 185
  • [36] Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability
    Kang Li
    Tang XiaoHu
    Liu JiaFen
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (11) : 1 - 14
  • [37] An efficient public key cryptosystem secure against chosen ciphertext attack
    Ghodosi, Hossein
    Information Systems Security, Proceedings, 2006, 4332 : 303 - 314
  • [38] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176
  • [39] Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
    Takahashi, Kota
    Hashimoto, Keitaro
    Ogata, Wakaha
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (02) : 277 - 301
  • [40] Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
    Kota Takahashi
    Keitaro Hashimoto
    Wakaha Ogata
    Designs, Codes and Cryptography, 2024, 92 : 277 - 301