A new public-key encryption scheme

被引:5
|
作者
Tian, Hai-Bo [1 ]
Sun, Xi [1 ]
Wang, Yu-Min [1 ]
机构
[1] Xidian Univ, State Key Lab ISN, Xian 710071, Peoples R China
关键词
public-key cryptosystems; deduction; security;
D O I
10.1007/s11390-007-9013-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme. As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption, the third version of knowledge of exponent assumption (KEA3). Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2). This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations. The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption. In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [1] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    [J]. Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [2] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin (National Key Lab of Integrated Service Networks
    [J]. Journal of Electronics(China), 2005, (05) : 490 - 497
  • [3] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin National Key Lab of Integrated Service Networks Xidian Univ Xian China
    [J]. Journal of Electronics., 2005, (05) - 497
  • [4] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [5] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [6] AN M3 PUBLIC-KEY ENCRYPTION SCHEME
    WILLIAMS, HC
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 358 - 368
  • [7] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [8] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [9] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    [J]. Journal of Cryptology, 2007, 20 : 265 - 294
  • [10] ON THE CONCEALABILITY OF MESSAGES BY THE WILLIAMS PUBLIC-KEY ENCRYPTION SCHEME
    KOTHARI, S
    LAKSHMIVARAHAN, S
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1984, 10 (01) : 15 - 24