A public-key encryption scheme with pseudo-random ciphertexts

被引:0
|
作者
Möller, B [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts indistinguishable from random bit strings. Ciphertext pseudo- randomness has applications in steganography. The new scheme features short ciphertexts due to the use of elliptic curve cryptography, with ciphertext pseudo- randomness achieved through a new key encapsulation mechanism (KEM) based on elliptic curve Diffie-Hellman with a pair of elliptic curves where each curve is a twist of the other. The public-key encryption scheme resembles the hybrid DHIES construction; besides by using the new KEM, it differs from DHIES in that it uses an authenticate-then-encrypt (AtE) rather than encrypt-then-authenticate (EtA) approach for symmetric cryptography.
引用
收藏
页码:335 / 351
页数:17
相关论文
共 50 条
  • [21] A "medium-field" multivariate public-key encryption scheme
    Wang, LC
    Yang, BY
    Hu, YH
    Lai, FP
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 132 - 149
  • [22] Quantum Random Oracle Model for Quantum Public-Key Encryption
    Shang, Tao
    Chen, Ranyiliu
    Lei, Qi
    IEEE ACCESS, 2019, 7 (130024-130031) : 130024 - 130031
  • [23] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin (National Key Lab of Integrated Service Networks
    Journal of Electronics(China), 2005, (05) : 490 - 497
  • [24] An Efficient Public-Key Dual-Receiver Encryption Scheme
    Gao, Chenglong
    Chen, Kai
    Wang, Qiang
    Chen, Zhixian
    IEEE ACCESS, 2022, 10 : 10799 - 10805
  • [25] A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE
    Jiang Zhengtao Hao Yanhua Wang Yumin National Key Lab of Integrated Service Networks Xidian Univ Xian China
    Journal of Electronics, 2005, (05) : 490 - 497
  • [26] Public-key encryption scheme with optimal continuous leakage resilience
    Zhou, Yanwei
    Xu, Ran
    Zhang, Wenzheng
    Xia, Zhe
    Yang, Bo
    Gu, Chunxiang
    Huang, Meijuan
    INFORMATION PROCESSING LETTERS, 2023, 180
  • [27] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105
  • [28] Human Public-Key Encryption
    Ferradi, Houda
    Geraud, Remi
    Naccache, David
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 494 - 505
  • [29] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [30] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    CHAOS, 2004, 14 (04) : 1078 - 1082