Generalized public-key cryptography with tight security

被引:1
|
作者
Wu, Ge [1 ,2 ]
Guo, Fuchun [2 ]
Susilo, Willy [2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Jiangsu, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
关键词
Public-key cryptography; General construction; Multi-user setting; Tight security; SIGNATURES; ENCRYPTION; PROOFS;
D O I
10.1016/j.ins.2019.07.041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tightly secure public-key cryptographic schemes enjoy the advantage that the selection of the security parameter can be optimal to achieve a certain security level. Security models in the multi-user setting with corruptions (MU-C) consider more realistic threats in practice. Many efforts have been devoted to constructing tightly MU-C secure schemes. To date, we have many concrete constructions. Nevertheless, the study on how to generally achieve tight security in public-key cryptography remains lacking. In this paper, we take an insight into the key generations in public-key cryptography. We first generalize the key generation algorithms of traditional schemes and discuss the requirements of achieving tight security. We notice that for some schemes (e.g. key-unique schemes), these requirements inherently cannot be satisfied and hence these schemes cannot achieve tight security. This is in accordance with the impossibility results of tight reductions by Bader et al. (EUROCRYPT 2016). To further study possible constructions, we extend the key generations of public-key cryptographic schemes to obtain a different framework. To demonstrate its applications, we illustrate how to construct tightly secure keyunique schemes under the extended framework. This circumvents the impossibility results of tight security for key-unique schemes. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:561 / 577
页数:17
相关论文
共 50 条
  • [21] Compliance defects in public-key cryptography
    Davis, D
    [J]. PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 171 - 178
  • [22] On the Performance of GPU Public-Key Cryptography
    Neves, Samuel
    Araujo, Filipe
    [J]. ASAP 2011 - 22ND IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2011), 2011, : 133 - 140
  • [23] Public-key cryptography for interactive apps
    不详
    [J]. DATAMATION, 1996, 42 (04): : 22 - 22
  • [24] Public-key cryptography in sensor networks
    Manley, Eric D.
    Deogun, Jitender S.
    Al Nahas, Huzaifa
    [J]. IASTED INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMERGING TECHNOLOGIES, 2005, : 120 - 125
  • [25] Reconfigurable processor for public-key cryptography
    Smyth, N
    McLoone, M
    McCanny, JV
    [J]. 2005 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS - DESIGN AND IMPLEMENTATION (SIPS), 2005, : 110 - 115
  • [26] Public-key cryptography on the top of a needle
    Batina, Lejla
    Mentens, Nele
    Sakiyarna, Kazuo
    Preneel, Bart
    Verbauwhede, Ingrid
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 1831 - 1834
  • [27] Probability theory and public-key cryptography
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 285 - 290
  • [28] Public-key cryptography and invariant theory
    Grigoriev D.
    [J]. Journal of Mathematical Sciences, 2005, 126 (3) : 1152 - 1157
  • [29] Public-key cryptography on smart cards
    Fuchsberger, A
    Gollmann, D
    Lothian, P
    Paterson, KG
    Sidiropoulos, A
    [J]. CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
  • [30] Hierarchical key assignment without public-key cryptography
    Lin, CH
    [J]. COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619