On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes

被引:0
|
作者
Baek, Joonsang [1 ]
Chu, Cheng-Kang [1 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore 138632, Singapore
来源
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present new constructions of (conventional) public key and stateful public key encryption schemes which produce ciphertexts of compact size while providing both efficiency and strong security. Our public key encryption scheme incurs only one group element ciphertext expansion (defined as the size of the ciphertext minus the size of the plaintext message) but compared with the previous scheme in the literature, its encryption algorithm is more efficient. Our stateful encryption scheme resolves the problem of ciphertext expansion of the existing schemes in the literature and hence can be served as a favorable alternative. Both of our schemes do not depend on the external length-preserving cipher constructed from the expensive strong pseudo random permutation. We provide security analysis of our schemes against chosen ciphertext attack under the well-known computational assumptions, in the random oracle model. We envision that our schemes can serve as efficient public key primitives suitable for implementing on resource-constrained devices.
引用
收藏
页码:302 / 318
页数:17
相关论文
共 50 条
  • [21] On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
    Hajiabadi, Mohammad
    Kapron, Bruce M.
    Srinivasan, Venkatesh
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 129 - 158
  • [22] Robust key-evolving public key encryption schemes
    Tzeng, WG
    Tzeng, ZJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 61 - 72
  • [23] Provably secure threshold public-key encryption with adaptive security and short ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Farras, Oriol
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2012, 210 : 67 - 80
  • [24] New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
    Doettling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Masny, Daniel
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 3 - 31
  • [25] Online encryption schemes: New security notions and constructions
    Boldyreva, A
    Taesombut, N
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 1 - 14
  • [26] Deducing trapdoor primitives in public key encryption schemes
    Pandey, C
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 81 - 91
  • [27] Public-Key Encryption Schemes with Auxiliary Inputs
    Dodis, Yevgeniy
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Peikert, Chris
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 361 - +
  • [28] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [29] Public key broadcast encryption schemes with shorter transmissions
    Park, Jong Hwan
    Kim, Hee Jean
    Sung, Maeng Hee
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON BROADCASTING, 2008, 54 (03) : 401 - 411
  • [30] Building Key-Private Public-Key Encryption Schemes
    Paterson, Kenneth G.
    Srinivasan, Sriramkrishnan
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 276 - 292