Efficient public key encryption with smallest ciphertext expansion from factoring

作者: Haifeng Qian , Yuan Zhou , Zhibin Li , Zecheng Wang , Bing Zhang

DOI: 10.1007/S10623-008-9179-5

关键词:

摘要: For public key encryption schemes, adaptive chosen ciphertext security is a widely accepted notion since it captures wide range of attacks. SAEP and SAEP+ are asymmetric schemes which were proven to achieve semantic against However, the bandwidth for message essentially worse, that expansion (the length difference between plaintext) too large. In most mobile networks constrained communication systems, necessary securely send as many messages possible. this article, we propose two chosen-ciphertext secure schemes. The first scheme generic padding based on trapdoor permutations. second one its application Rabin-Williams function has very fast algorithm. These both optimal w.r.t. expansion, namely with smallest expansion. Further, tight reductions shown prove these

参考文章(32)
Arjen K. Lenstra, Eric R. Verheul, Selecting Cryptographic Key Sizes public key cryptography. pp. 446- 465 ,(2000) , 10.1007/978-3-540-46588-1_30
M. Bellare, Optimal Asymmetric Encryption-How to Encrypt with RSA theory and application of cryptographic techniques. ,(1995)
Kaoru Kurosawa, Wakaha Ogata, Efficient Rabin-type Digital Signature Scheme Designs, Codes and Cryptography. ,vol. 16, pp. 53- 64 ,(1999) , 10.1023/A:1008374325369
Yang Cui, Kazukuni Kobara, Hideki Imai, A Generic Conversion with Optimal Redundancy Lecture Notes in Computer Science. pp. 104- 117 ,(2005) , 10.1007/978-3-540-30574-3_9
Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes international cryptology conference. pp. 26- 45 ,(1998) , 10.1007/BFB0055718
Duong Hieu Phan, David Pointcheval, OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding international conference on the theory and application of cryptology and information security. pp. 63- 77 ,(2004) , 10.1007/978-3-540-30539-2_5
M. O. Rabin, DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION MIT Laboratory for Computer Science. ,(1979)
Coron Jean-Sébastien, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen, GEM: A Generic Chosen-Ciphertext Secure Encryption Method the cryptographers track at the rsa conference. pp. 263- 276 ,(2002) , 10.1007/3-540-45760-7_18
Charles Rackoff, Daniel R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack international cryptology conference. pp. 433- 444 ,(1991) , 10.1007/3-540-46766-1_35
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7