Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman

作者: Eike Kiltz

DOI: 10.1007/978-3-540-71677-8_19

关键词: Key encapsulationProbabilistic encryptionDeterministic encryption40-bit encryptionEncryptionMultiple encryptionTheoretical computer scienceAttribute-based encryptionPlaintext-aware encryptionMathematics

摘要: We propose a practical key encapsulation mechanism with simple and intuitive design concept. Security against chosen-ciphertext attacks can be proved in the standard model under new assumption, Gap Hashed Diffie-Hellman (GHDH) assumption. The security reduction is tight simple. Secure encapsulation, combined an appropriately secure symmetric encryption scheme, yields hybrid public-key scheme which attacks. implied very efficient: compared to previously most efficient by Kurosawa Desmedt [Crypto 2004] it has 128 bits shorter ciphertexts, between 25-50% public/secret keys, slightly more terms of encryption/decryption speed. Furthermore, our enjoys (the option of) public verifiability ciphertexts inherits all advantages encryption.

参考文章(41)
Victor Shoup, Using hash functions as a hedge against chosen ciphertext attack theory and application of cryptographic techniques. pp. 275- 288 ,(2000) , 10.1007/3-540-45539-6_19
Oded Goldreich, Foundations of Cryptography: Basic Tools Cambridge University Press. ,(2000)
Shai Halevi, Phillip Rogaway, A parallelizable enciphering mode the cryptographers’ track at the rsa conference. pp. 292- 304 ,(2004) , 10.1007/978-3-540-24660-2_23
Mihir Bellare, Phillip Rogaway, David Wagner, The EAX Mode of Operation fast software encryption. ,vol. 3017, pp. 389- 407 ,(2004) , 10.1007/978-3-540-25937-4_25
R. Granger, D. Page, N. P. Smart, High Security Pairing-Based Cryptography Revisited Lecture Notes in Computer Science. pp. 480- 494 ,(2006) , 10.1007/11792086_34
Shai Halevi, EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data Progress in Cryptology - INDOCRYPT 2004. pp. 315- 327 ,(2004) , 10.1007/978-3-540-30556-9_25
Charles Rackoff, Daniel R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack international cryptology conference. pp. 433- 444 ,(1991) , 10.1007/3-540-46766-1_35
Tatsuaki Okamoto, David Pointcheval, The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes public key cryptography. pp. 104- 118 ,(2001) , 10.1007/3-540-44586-2_8
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7
Kaoru Kurosawa, Yvo Desmedt, A New Paradigm of Hybrid Encryption Scheme Advances in Cryptology – CRYPTO 2004. ,vol. 3152, pp. 426- 442 ,(2004) , 10.1007/978-3-540-28628-8_26