A new public-key encryption scheme

被引:5
|
作者
Tian, Hai-Bo [1 ]
Sun, Xi [1 ]
Wang, Yu-Min [1 ]
机构
[1] Xidian Univ, State Key Lab ISN, Xian 710071, Peoples R China
关键词
public-key cryptosystems; deduction; security;
D O I
10.1007/s11390-007-9013-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme. As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption, the third version of knowledge of exponent assumption (KEA3). Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2). This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations. The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption. In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [31] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    [J]. Tiedao Xuebao, 2006, 5 (95-98):
  • [32] CASE: A New Frontier in Public-Key Authenticated Encryption
    Agrawal, Shashank
    Agrawal, Shweta
    Prabhakaran, Manoj
    Raghunath, Rajeev
    Singla, Jayesh
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 189 - 219
  • [33] Functional Encryption: A New Vision for Public-Key Cryptography
    Boneh, Dan
    Sahai, Amit
    Waters, Brent
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (11) : 56 - 64
  • [34] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227
  • [35] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659
  • [36] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [37] On some variations of Kurosawa-Desmedt public-key encryption scheme
    Phong, Le Trieu
    Ogata, Wakaha
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 226 - 230
  • [38] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [39] Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
    Hulsing, Andreas
    Meijers, Matthias
    Strub, Pierre-Yves
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 622 - 653
  • [40] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    [J]. 2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,