A public-key encryption scheme with pseudo-random ciphertexts

被引:0
|
作者
Möller, B [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts indistinguishable from random bit strings. Ciphertext pseudo- randomness has applications in steganography. The new scheme features short ciphertexts due to the use of elliptic curve cryptography, with ciphertext pseudo- randomness achieved through a new key encapsulation mechanism (KEM) based on elliptic curve Diffie-Hellman with a pair of elliptic curves where each curve is a twist of the other. The public-key encryption scheme resembles the hybrid DHIES construction; besides by using the new KEM, it differs from DHIES in that it uses an authenticate-then-encrypt (AtE) rather than encrypt-then-authenticate (EtA) approach for symmetric cryptography.
引用
收藏
页码:335 / 351
页数:17
相关论文
共 50 条
  • [1] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [2] Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 62 - 76
  • [3] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [4] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [5] Provably secure threshold public-key encryption with adaptive security and short ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Farras, Oriol
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2012, 210 : 67 - 80
  • [6] Adaptively anonymous public-key broadcast encryption scheme without random oracle
    Wang, Hao
    Wu, Lei
    Journal of Networks, 2014, 9 (06) : 1656 - 1663
  • [7] Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
    Sakai, Yusuke
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 165 - 172
  • [8] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [9] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [10] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271