New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability

被引:0
|
作者
Weng, Zhiwei [1 ]
Weng, Jian [1 ]
He, Kai [1 ]
Li, Yingkai [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou, Guangdong, Peoples R China
关键词
Public key encryption; adaptive chosen-ciphertext security; gap hashed Diffie-Hellman assumption; PKE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a new public-key encryption scheme, and prove its adaptive chosen-ciphertext security under the gap hashed Diffie-Hellman assumption in the standard model. Compared with previous public key encryption schemes with adaptive chosen-ciphertext security, our proposed scheme simultaneously enjoys the following advantages: small public key size, short ciphertext, low computational cost, weak complexity assumption and public verifiability.
引用
收藏
页码:170 / 176
页数:7
相关论文
共 50 条
  • [1] Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
    Hanaoka, Goichiro
    Imai, Hideki
    Ogawa, Kazuto
    Watanabe, Hajime
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2008, 5312 : 20 - 33
  • [2] Tight chosen ciphertext attack(CCA)-secure hybrid encryption scheme with full public verifiability
    KANG Li
    TANG XiaoHu
    LIU JiaFen
    ScienceChina(InformationSciences), 2014, 57 (11) : 162 - 175
  • [3] Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability
    Li Kang
    XiaoHu Tang
    JiaFen Liu
    Science China Information Sciences, 2014, 57 : 1 - 14
  • [4] Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability
    Kang Li
    Tang XiaoHu
    Liu JiaFen
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (11) : 1 - 14
  • [5] Chosen ciphertext secure public key threshold encryption without random oracles
    Boneh, D
    Boyen, X
    Halevi, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 226 - 243
  • [6] Chosen-ciphertext attack secure public key encryption with auxiliary inputs
    Zhang, Zongyang
    Cao, Zhenfu
    Qian, Haifeng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1404 - 1411
  • [7] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Emura, Keita
    Hanaoka, Goichiro
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 32 - 50
  • [8] A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
    Camenisch, Jan
    Chandran, Nishanth
    Shoup, Victor
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 351 - +
  • [9] Efficient chosen ciphertext secure public-key encryption under factoring assumption
    Qin, Baodong
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 351 - 360
  • [10] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85