A chosen-cipher secure encryption scheme tightly as secure as factoring

被引:0
|
作者
Fujisaki, E [1 ]
Okamoto, T [1 ]
机构
[1] NTT Labs, Yokosuka, Kanagawa 2390847, Japan
关键词
chosen-cipher security; factoring; random oracle; exact security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt'98, Okamoto and Uchiyama presented a new trap-door tone-way) function based on factoring [11], while Fujisaki and Okamoto, at CRYPTO'99, showed a generic conversion from just one-way encryption to chosen-cipher secure encryption in the random oracle model [6]. This paper shows that the result of combining both schemes is well harmonized (rather than an arbitrary combination) and, in the sense of exact security, boosts the level of security more than would be expected from [6]-The security of the scheme yielded by the combination is tightly reduced from factoring. This paper also gives a rigorous description of the new scheme, because this type of encryption may suffer serious damage if poorly implemented. The proposed scheme is at least as efficient as any other chosen-cipher secure asymmetric encryption scheme such as [2], [4], [13].
引用
收藏
页码:179 / 187
页数:9
相关论文
共 50 条
  • [1] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    Shoup, Victor
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 102 - 118
  • [2] Practical Chosen Ciphertext Secure Encryption from Factoring
    Hofheinz, Dennis
    Kiltz, Eike
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 313 - 332
  • [3] Practical Chosen Ciphertext Secure Encryption from Factoring
    Dennis Hofheinz
    Eike Kiltz
    Victor Shoup
    [J]. Journal of Cryptology, 2013, 26 : 102 - 118
  • [4] Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited
    Mei, Qixiang
    Li, Bao
    Lu, Xianhui
    Jia, Dingding
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 210 - 227
  • [5] Efficient chosen ciphertext secure public-key encryption under factoring assumption
    Qin, Baodong
    Liu, Shengli
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 351 - 360
  • [6] Tightly CCA-secure inner product functional encryption scheme
    Liu, Xiangyu
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 898 : 1 - 19
  • [7] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [8] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    [J]. CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [9] Chosen Ciphertext Secure Fuzzy Identity-Based Encryption Scheme With Short Ciphertext
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    [J]. ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1036 - 1040
  • [10] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
    Lee, Youngkyung
    Lee, Dong Hoon
    Park, Jong Hwan
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (11) : 2433 - 2452