A public-key encryption scheme with pseudo-random ciphertexts

被引:0
|
作者
Möller, B [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts indistinguishable from random bit strings. Ciphertext pseudo- randomness has applications in steganography. The new scheme features short ciphertexts due to the use of elliptic curve cryptography, with ciphertext pseudo- randomness achieved through a new key encapsulation mechanism (KEM) based on elliptic curve Diffie-Hellman with a pair of elliptic curves where each curve is a twist of the other. The public-key encryption scheme resembles the hybrid DHIES construction; besides by using the new KEM, it differs from DHIES in that it uses an authenticate-then-encrypt (AtE) rather than encrypt-then-authenticate (EtA) approach for symmetric cryptography.
引用
收藏
页码:335 / 351
页数:17
相关论文
共 50 条
  • [31] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [32] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [33] Improvement in public-key encryption and key exchange scheme based on Chebyshev polynomials
    School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
    不详
    不详
    Tiedao Xuebao, 2006, 5 (95-98):
  • [34] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659
  • [35] Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes
    Wang Houzhen
    Shen Changxiang
    Xu Zhengquan
    Zhang Huanguo
    CHINA COMMUNICATIONS, 2011, 8 (04) : 23 - 31
  • [36] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [37] On some variations of Kurosawa-Desmedt public-key encryption scheme
    Phong, Le Trieu
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 226 - 230
  • [38] Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt
    Hulsing, Andreas
    Meijers, Matthias
    Strub, Pierre-Yves
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 622 - 653
  • [39] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [40] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771