PA in the two-key setting and a generic conversion for encryption with anonymity

作者: Ryotaro Hayashi , Keisuke Tanaka

DOI: 10.1007/11780656_23

关键词:

摘要: We propose the notion of plaintext awareness in two-key setting, called PATK. also prove that if a public-key encryption scheme is secure sense PATK, then it IK-CCA. Since looks much easier to PATK than directly IK-CCA, useful anonymity property schemes. We first generic conversion for anonymity, is, we derived from Fujisaki-Okamoto scheme, where basic IK-CPA, IK-CCA random oracle model.

参考文章(24)
M. Bellare, Optimal Asymmetric Encryption-How to Encrypt with RSA theory and application of cryptographic techniques. ,(1995)
Kazue Sako, An Auction Protocol Which Hides Bids of Losers public key cryptography. pp. 422- 432 ,(2000) , 10.1007/978-3-540-46588-1_28
Yang Cui, Kazukuni Kobara, Hideki Imai, A Generic Conversion with Optimal Redundancy Lecture Notes in Computer Science. pp. 104- 117 ,(2005) , 10.1007/978-3-540-30574-3_9
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes international cryptology conference. pp. 26- 45 ,(1998) , 10.1007/BFB0055718
Phillip Rogaway, Martín Abadi, Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) Lecture Notes in Computer Science. pp. 3- 22 ,(2000)
Mihir Bellare, Phillip Rogaway, Optimal asymmetric encryption theory and application of cryptographic techniques. pp. 92- 111 ,(1994) , 10.1007/BFB0053428
Yang Cui, Kazukuni Kobara, Hideki Imai, Compact Conversion Schemes for the Probabilistic OW-PCA Primitives international conference on information and communication security. pp. 269- 279 ,(2003) , 10.1007/978-3-540-39927-8_25
Ryotaro Hayashi, Keisuke Tanaka, The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity Public Key Cryptography - PKC 2005. pp. 216- 233 ,(2005) , 10.1007/978-3-540-30580-4_15
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka, An RSA family of trap-door permutations with a common domain and its applications public key cryptography. pp. 291- 304 ,(2004) , 10.1007/978-3-540-24632-9_21
David Pointcheval, Chosen-Ciphertext Security for Any One-Way Cryptosystem public key cryptography. pp. 129- 146 ,(2000) , 10.1007/978-3-540-46588-1_10