A public-key encryption scheme with pseudo-random ciphertexts

被引:0
|
作者
Möller, B [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts indistinguishable from random bit strings. Ciphertext pseudo- randomness has applications in steganography. The new scheme features short ciphertexts due to the use of elliptic curve cryptography, with ciphertext pseudo- randomness achieved through a new key encapsulation mechanism (KEM) based on elliptic curve Diffie-Hellman with a pair of elliptic curves where each curve is a twist of the other. The public-key encryption scheme resembles the hybrid DHIES construction; besides by using the new KEM, it differs from DHIES in that it uses an authenticate-then-encrypt (AtE) rather than encrypt-then-authenticate (EtA) approach for symmetric cryptography.
引用
收藏
页码:335 / 351
页数:17
相关论文
共 50 条
  • [41] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27
  • [42] Design and Implementation of a Lattice-Based Public-Key Encryption Scheme
    Lin, Hui
    Liu, Dongsheng
    Zhang, Cong
    Dong, Yahui
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (13)
  • [43] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [44] Authenticated public key broadcast encryption with short ciphertexts
    Guo, Dianli
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Li, Wenmin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) : 23399 - 23414
  • [45] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227
  • [46] Authenticated public key broadcast encryption with short ciphertexts
    Dianli Guo
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Wenmin Li
    Multimedia Tools and Applications, 2019, 78 : 23399 - 23414
  • [47] TFHE Public-Key Encryption Revisited
    Joye, Marc
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 277 - 291
  • [48] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [49] Public-Key Encryption with Lazy Parties
    Yasunaga, Kenji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) : 590 - 600
  • [50] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    CRYPTOGRAPHY, 2023, 7 (04)